-
1
-
-
63749119913
-
Frontiers of DRM knowledge and technology
-
H. Abie, "Frontiers of DRM knowledge and technology," International Journal of Computer Science and Network Security, vol. 7, no. 1, pp. 216-231, 2007.
-
(2007)
International Journal of Computer Science and Network Security
, vol.7
, Issue.1
, pp. 216-231
-
-
Abie, H.1
-
3
-
-
69249168719
-
Persistent access control: a formal model for DRM
-
Alexandria, Virginia, USA Oct
-
A. Arnab and A. Hutchison, "Persistent access control: a formal model for DRM," Proceedings of 2007 ACMWorkshop on Digital Rights Management, Alexandria, Virginia, USA, pp. 41-53, Oct. 2007.
-
(2007)
Proceedings of 2007 ACMWorkshop on Digital Rights Management
, pp. 41-53
-
-
Arnab, A.1
Hutchison, A.2
-
6
-
-
35948989614
-
Who should own access rights? A game- theoretical approach to striking the optimal balance in the debate over digital rights management
-
Y. Chang, "Who should own access rights? A game- theoretical approach to striking the optimal balance in the debate over digital rights management," Artificial Intelligence and Law, no. 15, pp. 323-356, 2007.
-
(2007)
Artificial Intelligence and Law
, Issue.15
, pp. 323-356
-
-
Chang, Y.1
-
8
-
-
34547440418
-
Privacy-enhanced superdistribution of layered content with trusted access control
-
Alexandria, Virginia, USA, Oct
-
D. Chong and R. Deng, "Privacy-enhanced superdistribution of layered content with trusted access control," Proceedings of 2006 ACM Workshop on Digital Rights Management, Alexandria, Virginia, USA, pp. 37-43, Oct. 2006.
-
(2006)
Proceedings of 2006 ACM Workshop on Digital Rights Management
, pp. 37-43
-
-
Chong, D.1
Deng, R.2
-
10
-
-
33750274436
-
Privacy- preserving digital rights management
-
C. Conrado, M. Petkovic, and W. Jonker, "Privacy- preserving digital rights management," Proceedings of 2004 SIAM International Conference on Data Mining, LNCS 3178, pp. 83-99, 2004.
-
(2004)
Proceedings of 2004 SIAM International Conference on Data Mining, LNCS 3178
, pp. 83-99
-
-
Conrado, C.1
Petkovic, M.2
Jonker, W.3
-
11
-
-
34547468412
-
Towards an open, trusted digital rights management platform
-
Alexandria, Virginia, USA, Oct
-
A. Cooper and A. Martin, "Towards an open, trusted digital rights management platform," Proceedings of 2006 ACMWorkshop on Digital Rights Management, Alexandria, Virginia, USA, pp. 79-87, Oct. 2006.
-
(2006)
Proceedings of 2006 ACMWorkshop on Digital Rights Management
, pp. 79-87
-
-
Cooper, A.1
Martin, A.2
-
12
-
-
77954328445
-
A robust content-dependent algorithm for video watermarking
-
Alexandria, Virginia, USA, Oct
-
L. Coria, P. Nasiopoulos, and R. Ward, "A robust content-dependent algorithm for video watermarking," Proceedings of 2006 ACM Workshop on Digital Rights Management, Alexandria, Virginia, USA, pp. 97-101, Oct. 2006.
-
(2006)
Proceedings of 2006 ACM Workshop on Digital Rights Management
, pp. 97-101
-
-
Coria, L.1
Nasiopoulos, P.2
Ward, R.3
-
13
-
-
84875353772
-
-
Digital Trust - Intellectual Property Protection
-
Digital Trust, vol. 3 - Intellectual Property Protection, 2007. (http://www.csc.com/aboutus/leadingedge-forum/knowledgelibrary/uploads/LEF2007Digital-TrustVol3.pdf)
-
(2007)
, vol.3
-
-
-
15
-
-
34547381908
-
Advances in digital rights management technology and application
-
K. Fan, W. Mo, S. Cao, X. Zhao, and Q, Pei, "Advances in digital rights management technology and application," ACTA Electronica Sinica, vol. 35, no. 6, pp. 1139-1147, 2007.
-
(2007)
ACTA Electronica Sinica
, vol.35
, Issue.6
, pp. 1139-1147
-
-
Fan, K.1
Mo, W.2
Cao, S.3
Zhao, X.4
Pei, Q.5
-
16
-
-
34247482819
-
An iris biometric-based digital multimedia content protection scheme
-
K. Fan, M. Wang, W. Mo, Z. Wang, Q. Pei, and J. Shen, "An iris biometric-based digital multimedia content protection scheme," ACTA Electronic Sinica, vol. 16, no. 2, pp. 271-275, 2007.
-
(2007)
ACTA Electronic Sinica
, vol.16
, Issue.2
, pp. 271-275
-
-
Fan, K.1
Wang, M.2
Mo, W.3
Wang, Z.4
Pei, Q.5
Shen, J.6
-
19
-
-
46649103651
-
The mobile digital contents distribution scenario
-
Toronto, Ontario, Canada, July
-
E. Furregoni, A. Rangone, F. Renga, and M. Valsecchi, "The mobile digital contents distribution scenario," Proceedings of Sixth International Conference on the Management of Mobile Business, Toronto, Ontario, Canada, pp. 32-40, July 2007.
-
(2007)
Proceedings of Sixth International Conference on the Management of Mobile Business
, pp. 32-40
-
-
Furregoni, E.1
Rangone, A.2
Renga, F.3
Valsecchi, M.4
-
22
-
-
14844304683
-
Privacy protection for signed media files: A separation-of-duty approach to the lightweight DRM (LWDRM) system
-
Magdeburg, Germany, Sep
-
R. Grimm and P. Aichroth, "Privacy protection for signed media files: A separation-of-duty approach to the lightweight DRM (LWDRM) system," Proceedings of 2004 Workshop on Multimedia and Security, Magdeburg, Germany, pp. 93-99, Sep. 2004.
-
(2004)
Proceedings of 2004 Workshop on Multimedia and Security
, pp. 93-99
-
-
Grimm, R.1
Aichroth, P.2
-
24
-
-
40549112646
-
A formal foundation for XrML
-
J. Halpern and V. Weissman, "A formal foundation for XrML," Journal of the ACM, vol. 55, no. 1, pp. 4-45, 2008.
-
(2008)
Journal of the ACM
, vol.55
, Issue.1
, pp. 4-45
-
-
Halpern, J.1
Weissman, V.2
-
25
-
-
48249123572
-
-
Dec.
-
N. Helberger, N. Dufft, S. Gompel, K. Kerenyi, B. Krings, and R. Lambers, Digital Rights Management and Consumer Acceptability, Dec. 2004. (http://www.indicare.org)
-
(2004)
Digital Rights Management and Consumer Acceptability
-
-
Helberger, N.1
Dufft, N.2
Gompel, S.3
Kerenyi, K.4
Krings, B.5
Lambers, R.6
-
26
-
-
70349982376
-
The DRM game
-
Alexandria, Virginia, USA, Oct
-
G. Heileman, P. Jamkhedkar, J. Khoury, and C. Hrncir, "The DRM game," Proceedings of 2007 ACM Workshop on Digital Rights Management, Alexandria, Virginia, USA, pp. 54-62, Oct. 2007.
-
(2007)
Proceedings of 2007 ACM Workshop on Digital Rights Management
, pp. 54-62
-
-
Heileman, G.1
Jamkhedkar, P.2
Khoury, J.3
Hrncir, C.4
-
28
-
-
79957583392
-
Access Controls in the digital era and the fair use/first sale doctrines
-
E. Hinkes, "Access Controls in the digital era and the fair use/first sale doctrines," Santa Clara Computer and High -Technology Law Journal, vol. 23, no. 4, pp. 685-726, 2007.
-
(2007)
Santa Clara Computer and High -Technology Law Journal
, vol.23
, Issue.4
, pp. 685-726
-
-
Hinkes, E.1
-
30
-
-
18844387654
-
DRM as a layered system
-
Alexandria, Virginia, USA, Oct
-
P. Jamkhedkar and G. Heileman, "DRM as a layered system," Proceedings of 2004 ACM Workshop on Digital Rights Management, Alexandria, Virginia, USA, pp. 11-21, Oct. 2004.
-
(2004)
Proceedings of 2004 ACM Workshop on Digital Rights Management
, pp. 11-21
-
-
Jamkhedkar, P.1
Heileman, G.2
-
31
-
-
34547539234
-
The problem with rights expression languages
-
Alexandria, Virginia, USA, Oct
-
P. Jamkhedkar, G. Heileman, and I. Ortiz, "The problem with rights expression languages," Proceedings of 2006 ACM Workshop on Digital Rights Management, Alexandria, Virginia, USA, pp. 59-67, Oct. 2006.
-
(2006)
Proceedings of 2006 ACM Workshop on Digital Rights Management
, pp. 59-67
-
-
Jamkhedkar, P.1
Heileman, G.2
Ortiz, I.3
-
32
-
-
33745827414
-
New broadcast encryption scheme using tree-based circle
-
Alexandria, Virginia, USA, Nov
-
N. Jho, E. Yoo, J. Cheon, and M. Kim, "New broadcast encryption scheme using tree-based circle," Proceedings of 2005 ACM Workshop on Digital Rights Management, Alexandria, Virginia, USA, pp. 37-44, Nov. 2005.
-
(2005)
Proceedings of 2005 ACM Workshop on Digital Rights Management
, pp. 37-44
-
-
Jho, N.1
Yoo, E.2
Cheon, J.3
Kim, M.4
-
33
-
-
18844419457
-
Traitor tracing for prerecorded and recordable media
-
Alexandria, Virginia, USA, Oct
-
H. Jin, J. Lotspiech, and S. Nusser, "Traitor tracing for prerecorded and recordable media," Proceedings of 2004 ACM Workshop on Digital Rights Management, Alexandria, Virginia, USA, pp. 83-90, Oct. 2004.
-
(2004)
Proceedings of 2004 ACM Workshop on Digital Rights Management
, pp. 83-9
-
-
Jin, H.1
Lotspiech, J.2
Nusser, S.3
-
34
-
-
34547441019
-
Digital rights management with right delegation for home networks
-
H. KIM, Y. Lee, B. Chung, H. Yoon, J. Lee, and K. Jung, "Digital rights management with right delegation for home networks," Proceedings of 9th International Conference on Information Security and Cryptology, LNCS 4296, pp. 233-245, 2004.
-
(2004)
Proceedings of 9th International Conference on Information Security and Cryptology, LNCS 4296
, pp. 233-245
-
-
Kim, H.1
Lee, Y.2
Chung, B.3
Yoon, H.4
Lee, J.5
Jung, K.6
-
35
-
-
84875304854
-
-
Digital Rights Management
-
P. Koster and W. Jonker, Digital Rights Management, 2008. (http://www.springerlink.com/index/v317858416435v64.pdf)
-
(2008)
-
-
Koster, P.1
Jonker, W.2
-
36
-
-
36348983252
-
Identity-based DRM: Personal entertainment domain
-
P. Koster, F. Kamperman, P. Lenoir, and K. Vrielink, "Identity-based DRM: Personal entertainment domain," Proceeding of Transactions on Data Hiding and Multimedia Security, LNCS 4300, pp. 104-122, 2006.
-
(2006)
Proceeding of Transactions on Data Hiding and Multimedia Security, LNCS 4300
, pp. 104-122
-
-
Koster, P.1
Kamperman, F.2
Lenoir, P.3
Vrielink, K.4
-
37
-
-
36348944463
-
Introduction of the domain issuer in OMA DRM
-
Las Vegas, NV, United States, Jan
-
th Annual IEEE Consumer Communications and Networking Conference, Las Vegas, NV, United States, pp. 940-944, Jan. 2007.
-
(2007)
th Annual IEEE Consumer Communications and Networking Conference
, pp. 940-944
-
-
Koster, P.1
Montaner, J.2
Koraichi, N.3
Iacob, S.4
-
38
-
-
27244446779
-
Secure data management in trusted computing
-
U. Kuhn, K. Kursawe, and S. Lucks, "Secure data management in trusted computing," Proceedings of 7th International Workshop on Cryptographic Hardware and Embedded Systems, LNCS 3659, pp. 324-338, 2005.
-
(2005)
Proceedings of 7th International Workshop on Cryptographic Hardware and Embedded Systems, LNCS 3659
, pp. 324-338
-
-
Kuhn, U.1
Kursawe, K.2
Lucks, S.3
-
39
-
-
0346885752
-
A DRM framework for distributing digital contents through the Internet
-
Dec
-
J. Lee, S. Hwang, S. Jeong, K. Yoon, C. Park and J. Ryou, "A DRM framework for distributing digital contents through the Internet," ETRI Journal, vol. 25, no. 6, pp. 423-436, Dec. 2003.
-
(2003)
ETRI Journal
, vol.25
, Issue.6
, pp. 423-436
-
-
Lee, J.1
Hwang, S.2
Jeong, S.3
Yoon, K.4
Park, C.5
Ryou, J.6
-
40
-
-
7444222166
-
Digital rights management for content distribution
-
Adelaide, Australia
-
Q. Liu, R. Naini, and N. Sheppard, "Digital rights management for content distribution," Proceedings of the 2003 Australasian Information Security Workshop, Adelaide, Australia, pp. 49-58, 2003.
-
(2003)
Proceedings of the 2003 Australasian Information Security Workshop
, pp. 49-58
-
-
Liu, Q.1
Naini, R.2
Sheppard, N.3
-
41
-
-
33745812431
-
Improved watermark detection for spread-spectrum based watermarking using independent component analysis
-
Alexandria, Virginia, USA,, Nov
-
H. Malik, A. Khokhar, and R. Ansari, "Improved watermark detection for spread-spectrum based watermarking using independent component analysis," Proceedings of 2005 ACM Workshop on Digital Rights Management, Alexandria, Virginia, USA, pp. 102-111, Nov. 2005.
-
(2005)
Proceedings of 2005 ACM Workshop on Digital Rights Management
, pp. 102-111
-
-
Malik, H.1
Khokhar, A.2
Ansari, R.3
-
42
-
-
33749054480
-
Enabling DRM-preserving digital content redistribution
-
July
-
S. Nair, B. Popescu, C. Gamage, B. Crispo, and A. Tanenbaum, "Enabling DRM-preserving digital content redistribution," Proceedings of the Seventh IEEE International Conference on E-Commerce Technology, pp. 151-158, July 2005.
-
(2005)
Proceedings of the Seventh IEEE International Conference on E-Commerce Technology
, pp. 151-158
-
-
Nair, S.1
Popescu, B.2
Gamage, C.3
Crispo, B.4
Tanenbaum, A.5
-
48
-
-
77956960459
-
-
Open Mobile Alliance Specification, July
-
Open Mobile Alliance Specification, DRM Architecture Candidate Ver. 2.1, July 2007.
-
(2007)
DRM Architecture Candidate Ver. 2.1
-
-
-
49
-
-
84875299804
-
-
Open Digital Rights Language (ODRL) version 1.1
-
Open Digital Rights Language (ODRL) version 1.1, 2002. (http://www.w3.org/TR/odrl)
-
(2002)
-
-
-
50
-
-
84875312583
-
-
Open Mobile Alliance Specification, DRM Rights Expression Language Candidate Ver. 2.1, July
-
Open Mobile Alliance Specification, DRM Rights Expression Language Candidate Ver. 2.1, July 2007.
-
(2007)
-
-
-
51
-
-
84875341611
-
-
Open Mobile Terminal Platform Forum Report, Application Security Framework, Open Mobile Terminal Platform, Sep
-
Open Mobile Terminal Platform Forum Report, Application Security Framework, Open Mobile Terminal Platform, Sep. 2007. (http://www.omtp.org/pdf/archivedpapers/OMTPApplicationSecurityFrameworkv20.pdf)
-
(2007)
-
-
-
52
-
-
84875354235
-
-
Open Mobile Alliance Specification, July
-
Open Mobile Alliance Specification, DRM Specification Candidate Ver. 2.1, July 2006.
-
(2006)
DRM Specification Candidate Ver. 2.1
-
-
-
53
-
-
3142523603
-
The UCONABC usage control model
-
J. Park and R. Sandhu, "The UCONABC usage control model," ACM Transactions on Information and System Security, vol. 7, no. 1, pp. 128-174, 2004.
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, Issue.1
, pp. 128-174
-
-
Park, J.1
Sandhu, R.2
-
54
-
-
35448976398
-
Digital rights management for home networks using ID-based public key system and group signature
-
Oct
-
Q. Pei, J, Ma and J. Dai, "Digital rights management for home networks using ID-based public key system and group signature," Chinese Journal of Electronics, vol. 16, no. 4, pp. 653-669, Oct. 2007.
-
(2007)
Chinese Journal of Electronics
, vol.16
, Issue.4
, pp. 653-669
-
-
Pei, Q.1
Ma, J.2
Dai, J.3
-
55
-
-
0346958524
-
Vertrauen in digitale transaktionen
-
O. Petrovic, M. Fallenbock, C. Kittl, and T. Wolkinger, "Vertrauen in digitale transaktionen, "Wirtschafts Informatik, vol. 45, no. 1, pp. 53-66, 2003.
-
(2003)
Wirtschafts Informatik
, vol.45
, Issue.1
, pp. 53-66
-
-
Petrovic, O.1
Fallenbock, M.2
Kittl, C.3
Wolkinger, T.4
-
56
-
-
84874280432
-
Trusted computing in mobile platforms
-
E. Pisko, K. Rannenberg, and H. Heiko Robnagel, "Trusted computing in mobile platforms," Datenschutz und Datensicherheit, vol. 29, no. 9, pp. 526-530, 2005.
-
(2005)
Datenschutz und Datensicherheit
, vol.29
, Issue.9
, pp. 526-530
-
-
Pisko, E.1
Rannenberg, K.2
Heiko Robnagel, H.3
-
57
-
-
18844410277
-
A DRM security architecture for home networks
-
Alexandria, Virginia, USA, Oct
-
th ACM Workshop on Digital Rights Management, Alexandria, Virginia, USA, pp. 1-10, Oct. 2004.
-
(2004)
th ACM Workshop on Digital Rights Management
, pp. 1-10
-
-
Popescu, B.1
Crisop, B.2
Tanenbaum, A.3
Kamperman, F.4
-
60
-
-
71049135827
-
DRM, trusted computing and operating system architecture
-
Newcastle, Australia
-
J. Reid and W. Caelli, "DRM, trusted computing and operating system architecture," Proceedings of 2005 the Australasian Information Security Workshop, Newcastle, Australia, pp.127-136, 2005.
-
(2005)
Proceedings of 2005 the Australasian Information Security Workshop
, pp. 127-136
-
-
Reid, J.1
Caelli, W.2
-
61
-
-
36348997987
-
Trust in event reporting mechanisms for DRM
-
Las Vegas, NV, United States, Jan
-
th Annual IEEE Consumer Communications and Networking Conference, Las Vegas, NV, United States, pp. 1058-1062, Jan. 2007.
-
(2007)
th Annual IEEE Consumer Communications and Networking Conference
, pp. 1058-1062
-
-
Rodrguez, E.1
Delgado, J.2
-
62
-
-
33847140217
-
DRM, law and technology: An American perspective
-
B. Rosenblatt, "DRM, law and technology: an American perspective," Online Information Review, vol. 31, no. 1, pp. 73-84, 2007.
-
(2007)
Online Information Review
, vol.31
, Issue.1
, pp. 73-84
-
-
Rosenblatt, B.1
-
63
-
-
38149092534
-
A generic DRM framework for J2ME applications
-
Helsinki, Finland, Aug
-
N. Santos, P. Pereira, and L. Silva, "A generic DRM framework for J2ME applications," Proceedings of First International Mobile IPR Workshop: Rights Management of Information Products on the Mobile Internet, Helsinki, Finland, pp. 53-66, Aug. 2003.
-
(2003)
Proceedings of First International Mobile IPR Workshop: Rights Management of Information Products on the Mobile Internet
, pp. 53-66
-
-
Santos, N.1
Pereira, P.2
Silva, L.3
-
64
-
-
33745838992
-
Watermarking and ownership problem: A revisit
-
Alexandria, Virginia, USA, Nov
-
H. Sencar and N. Memon, "Watermarking and ownership problem: A revisit," Proceedings of 2005 ACM Workshop on Digital Rights Management, Alexandria, Virginia, USA, pp. 93-101, Nov. 2005.
-
(2005)
Proceedings of 2005 ACM Workshop on Digital Rights Management
, pp. 93-101
-
-
Sencar, H.1
Memon, N.2
-
65
-
-
47849132990
-
Efficient watermarking strategies
-
Nov
-
M. Steinebach, E. Hauer, and P. Wolf, "Efficient watermarking strategies," Proceedings of Third International Conference on Automated Production of Cross Media Content for Multichannel Distribution, pp. 65-71, Nov. 2007.
-
(2007)
Proceedings of Third International Conference on Automated Production of Cross Media Content for Multichannel Distribution
, pp. 65-71
-
-
Steinebach, M.1
Hauer, E.2
Wolf, P.3
-
67
-
-
29244467774
-
-
Trusted Computing Group Specification, Aug
-
Trusted Computing Group Specification, TCG PC Specific Implementation Specification, Aug. 2003. (https://www.trustedcomputinggroup.org/specs/PCClient)
-
(2003)
TCG PC Specific Implementation Specification
-
-
-
69
-
-
50549090759
-
-
Trusted Computing Group Specification, June
-
Trusted Computing Group Specification, TCG Mobile Trusted Module Specification Ver. 1.0, June 2007. (https://www.trustedcomputinggroup.org/groups/mobile)
-
(2007)
TCG Mobile Trusted Module Specification Ver. 1.0
-
-
-
70
-
-
51649129937
-
-
Trusted Computing Group Specification, June
-
Trusted Computing Group Specification, TCG Mobile Reference Architecture Ver. 1.0, June 2007. (https://www.trustedcomputinggroup.org/groups/mobile)
-
(2007)
TCG Mobile Reference Architecture Ver. 1.0
-
-
-
71
-
-
50549090759
-
-
Trusted Computing Group Report, June
-
Trusted Computing Group Report, Mobile Trusted Module Specification FAQ, June 2007. (https://www.trustedcomputinggroup.org/groups/mobile)
-
(2007)
Mobile Trusted Module Specification FAQ
-
-
-
72
-
-
33749129564
-
Decentralising the digital rights management value chain by means of distributed license catalogues
-
B. Vassiliadis, V. Fotopoulos, A. N. Skodras, "Decentralising the digital rights management value chain by means of distributed license catalogues," Proceeding of 2006 IFIP Artificial Intelligence Applications and Innovations, vol. 204, pp. 689-696, 2006.
-
(2006)
Proceeding of 2006 IFIP Artificial Intelligence Applications and Innovations
, vol.204
, pp. 689-696
-
-
Vassiliadis, B.1
Fotopoulos, V.2
Skodras, A.N.3
-
75
-
-
33847124490
-
-
Online Information Review
-
P. Wolf, M. Steinebach, and K. Diener, "Complementing DRM with digital watermarking: Mark, search, retrieve," Online Information Review, vol. 31, no. 1 pp. 10-21, 2007.
-
(2007)
Complementing DRM with digital watermarking: Mark search, retrieve
, vol.31
, Issue.1
, pp. 10-21
-
-
Wolf, P.1
Steinebach, M.2
Diener, K.3
-
76
-
-
79959837016
-
Protecting fair use from digital rights management in China
-
Alexandria, Virginia, USA, Oct
-
H. Xie, "Protecting fair use from digital rights management in China," Proceedings of 2007 ACM Workshop on Digital Rights Management, Alexandria, Virginia, USA, pp. 33-38, Oct. 2007.
-
(2007)
Proceedings of 2007 ACM Workshop on Digital Rights Management
, pp. 33-38
-
-
Xie, H.1
-
77
-
-
30544437057
-
A survey of the research on digital rights management
-
Y. Yu and Z. Tang, "A survey of the research on digital rights management," Chinese Journal of Computers, vol. 28, no. 12, pp. 1957-1968, 2005.
-
(2005)
Chinese Journal of Computers
, vol.28
, Issue.12
, pp. 1957-1968
-
-
Yu, Y.1
Tang, Z.2
-
78
-
-
70349603094
-
Implementing trustworthy dissemination of digital contents by using a third party attestation proxy-enabling remote attestation model
-
Three Gorge, China, Dec.
-
Z. Zhang, Q. Pei, J. Ma, and L. Yang, "Implementing trustworthy dissemination of digital contents by using a third party attestation proxy-enabling remote attestation model," Proceedings of 2008 International Conference of Multimedia and Information Technology, Three Gorge, China, Dec. 2008.
-
(2008)
Proceedings of 2008 International Conference of Multimedia and Information Technology
-
-
Zhang, Z.1
Pei, Q.2
Ma, J.3
Yang, L.4
-
79
-
-
70349979750
-
A benefits-centric multi-participant trust architecture for DRM-enabling digital contents value chain ecosystem
-
Wuhan, China, Dec
-
Z. Zhang, Q. Pei, J. Ma, and L. Yang, "A benefits-centric multi-participant trust architecture for DRM-enabling digital contents value chain ecosystem," Proceedings of International Seminar of Business and Information Management, Wuhan, China, Dec. 2008.
-
(2008)
Proceedings of International Seminar of Business and Information Management
-
-
Zhang, Z.1
Pei, Q.2
Ma, J.3
Yang, L.4
-
80
-
-
60349107939
-
A fine-grained digital rights transfer policy and trusted distribution and enforcement
-
Dec
-
Z. Zhang, Q. Pei, J.Ma, L.Yang, and K. Fan, "A fine-grained digital rights transfer policy and trusted distribution and enforcement," Proceedings of International Conference of Computational Intelligence and Security, pp. 457-462, Dec. 2008.
-
(2008)
Proceedings of International Conference of Computational Intelligence and Security
, pp. 457-462
-
-
Zhang, Z.1
Pei, Q.2
Ma, J.3
Yang, L.4
Fan, K.5
-
81
-
-
63749132915
-
Cooperative and non-cooperative game-theoretic analyses of adoptions of security policies for DRM
-
Las Vegas, Nevada, USA, Jan
-
Z. Zhang, Q. Pei, J.Ma, L. Yang, and K. Fan, "Cooperative and non-cooperative game-theoretic analyses of adoptions of security policies for DRM," Proceedings of 5th IEEE International Workshop on Digital Rights Management Impact on Consumer Communications, Satellite Workshop of 6th IEEE Consumer Communications & Networking Conference, Las Vegas, Nevada, USA, Jan. 2009.
-
(2009)
Proceedings of 5th IEEE International Workshop on Digital Rights Management Impact on Consumer Communications, Satellite Workshop of 6th IEEE Consumer Communications & Networking Conference
-
-
Zhang, Z.1
Pei, Q.2
Ma, J.3
Yang, L.4
Fan, K.5
-
82
-
-
47849106850
-
Research on usage control model with delegation characteristics based on OM-AM methodology
-
Dalian, China, Sep
-
Z. Zhang, L. Yang, Q. Pei, and J. Ma,"Research on usage control model with delegation characteristics based on OM-AM methodology," Proceeding s of IFIP International Conference on Network and Parallel Computing & Workshop on Networks System Security, Dalian, China, pp. 238-243, Sep. 2007.
-
(2007)
Proceeding s of IFIP International Conference on Network and Parallel Computing & Workshop on Networks System Security
, pp. 238-243
-
-
Zhang, Z.1
Yang, L.2
Pei, Q.3
Ma, J.4
-
83
-
-
33845940978
-
A conceptual architecture of a trusted mobile environment
-
Lyon, France
-
Y. Zheng, "A conceptual architecture of a trusted mobile environment," Proceedings of the Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, Lyon, France, pp. 75-81, June 2006.
-
(2006)
Proceedings of the Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing
, pp. 75-81
-
-
Zheng, Y.1
-
84
-
-
33646927616
-
Secure DRM scheme for future mobile networks based on trusted mobile platform
-
Wuhan, China
-
Y. Zheng, D. He, H. Wang, and X. Tang., "Secure DRM scheme for future mobile networks based on trusted mobile platform," Proceedings of 2005 International Conference on Wireless Communications, Networking and Mobile Computing, Wuhan, China, pp. 1164-1167, 2005.
-
(2005)
Proceedings of 2005 International Conference on Wireless Communications, Networking and Mobile Computing
, pp. 1164-1167
-
-
Zheng, Y.1
He, D.2
Wang, H.3
Tang, X.4
|