메뉴 건너뛰기




Volumn 8, Issue 18, 2015, Pages 3383-3404

Erratum to: An anonymous and secure biometric-based enterprise digital rights management system for mobile environment (Security and Communications Networks, (2015), 8, (3383–3404), 10.1002/sec.1266);An anonymous and secure biometric-based enterprise digital rights management system for mobile environment

Author keywords

Anonymity; Authorization; AVISPA; Content distribution; Digital rights management systems; Mobile user; Security

Indexed keywords

AUTHENTICATION; CRIME; NETWORK SECURITY; SECURITY SYSTEMS;

EID: 84929234268     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.1604     Document Type: Erratum
Times cited : (28)

References (53)
  • 1
    • 33746445539 scopus 로고    scopus 로고
    • Digital rights management
    • Subramanya SR, Yi BK. Digital rights management. IEEE Potentials 2006; 25(2):31-34.
    • (2006) IEEE Potentials , vol.25 , Issue.2 , pp. 31-34
    • Subramanya, S.R.1    Yi, B.K.2
  • 2
    • 33845230194 scopus 로고    scopus 로고
    • Survey on the technological aspects of digital rights management
    • in, Springer, Berlin Heidelberg
    • Ku W, Chi C, Survey on the technological aspects of digital rights management., in Information Security, Lecture Notes in Computer Science, LNCS, vol.3225, Springer, Berlin Heidelberg, 2004; 391-403.
    • (2004) Information Security, Lecture Notes in Computer Science, LNCS , vol.3225 , pp. 391-403
    • Ku, W.1    Chi, C.2
  • 5
    • 84896344547 scopus 로고    scopus 로고
    • [Accessed on February 2015].
    • Digital Rights Management. IEEE Emerging Technology portal, 2006-2012. Available at http://www.ieee.org/about/ technologies/emerging/digital/_rights.pdf. [Accessed on February 2015].
    • IEEE Emerging Technology portal, 2006-2012
  • 6
    • 84973581160 scopus 로고    scopus 로고
    • [Accessed on November 2014].
    • Kaspersky lab Internal ITThreats in Europe 2006. Available at http://www.viruslist.com/en/analysis?pubid=204791935. [Accessed on November 2014].
  • 7
    • 84869390518 scopus 로고    scopus 로고
    • Sensitivity analysis of loss of corporate efficiency and productivity associated with enterprise DRM technology
    • University of Economics in Prague, Czech Republic
    • Zeng W, Liu K. Sensitivity analysis of loss of corporate efficiency and productivity associated with enterprise DRM technology. 2012 Seventh International Conference on Availability, Reliability and Security (ARES), University of Economics in Prague, Czech Republic, 2012; 445-453.
    • (2012) 2012 Seventh International Conference on Availability, Reliability and Security (ARES) , pp. 445-453
    • Zeng, W.1    Liu, K.2
  • 10
    • 84973556196 scopus 로고    scopus 로고
    • [Accessed on November 2014].
    • Adobe Livecycle Document Security (2009). Available at http://www.adobe.com/content/dam/Adobe/en/devnet/ livecycle/pdfs/rm/_security/_tg.pdf [Accessed on November 2014].
  • 13
    • 84973565961 scopus 로고    scopus 로고
    • [Accessed on November 2014].
    • Authentica Delivers Next-Generation Enterprise Rights Management Platform (2005). Available at http://www.authentica.com/ news/ pr2005/ 02-14-2005-ARM.aspx [Accessed on November 2014].
    • (2005)
  • 14
    • 84973566207 scopus 로고    scopus 로고
    • Microsoft Windows Right Management Services System (2007). Available at http://technet.microsoft.com/en-us/magazine/2006.10.howitworks.aspx [Accessed on November 2014].
    • (2007) [Accessed on November 2014].
  • 15
    • 84973556193 scopus 로고    scopus 로고
    • Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
    • Van Wie DM, Weber RP. Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels (1999). US Patent 5, 943, 422.
    • (1999)
    • Van Wie, D.M.1    Weber, R.P.2
  • 17
    • 44949104171 scopus 로고    scopus 로고
    • A secure and traceable E-DRM system based on mobile device
    • Chen CL. A secure and traceable E-DRM system based on mobile device. Expert Systems with Applications 2008; 35(3):878-886.
    • (2008) Expert Systems with Applications , vol.35 , Issue.3 , pp. 878-886
    • Chen, C.L.1
  • 18
    • 80052413706 scopus 로고    scopus 로고
    • An efficient and reliable E-DRM scheme for mobile environments
    • Chang CC, Yang JH, Wang DW. An efficient and reliable E-DRM scheme for mobile environments. Expert Systems with Applications 2008; 37(9):6176-6181.
    • (2008) Expert Systems with Applications , vol.37 , Issue.9 , pp. 6176-6181
    • Chang, C.C.1    Yang, J.H.2    Wang, D.W.3
  • 19
    • 84880312349 scopus 로고    scopus 로고
    • A practical secure and efficient enterprise digital rights management mechanism suitable for mobile environment
    • Chang CC, Chang SC, Yang JH. A practical secure and efficient enterprise digital rights management mechanism suitable for mobile environment. Security and Communication Networks 2013; 6(8):972-984.
    • (2013) Security and Communication Networks , vol.6 , Issue.8 , pp. 972-984
    • Chang, C.C.1    Chang, S.C.2    Yang, J.H.3
  • 20
    • 84892444048 scopus 로고    scopus 로고
    • An authenticated group key distribution protocol based on the generalized Chinese remainder theorem
    • Guo C, Chang CC. An authenticated group key distribution protocol based on the generalized Chinese remainder theorem. International Journal of Communication Systems 2014; 27(1):126-134.
    • (2014) International Journal of Communication Systems , vol.27 , Issue.1 , pp. 126-134
    • Guo, C.1    Chang, C.C.2
  • 22
    • 84908416925 scopus 로고    scopus 로고
    • A group key distribution system based on the generalized Aryabhata remainder theorem for enterprise digital rights management
    • Liu Y, Chang CC, Chang SC. A group key distribution system based on the generalized Aryabhata remainder theorem for enterprise digital rights management. Journal of Information Hiding and Multimedia Signal Processing 2015; 6(1):140-153.
    • (2015) Journal of Information Hiding and Multimedia Signal Processing , vol.6 , Issue.1 , pp. 140-153
    • Liu, Y.1    Chang, C.C.2    Chang, S.C.3
  • 32
    • 70349792182 scopus 로고    scopus 로고
    • An efficient biometric-based remote user authentication scheme using smart cards
    • Li CT, Hwang MS. An efficient biometric-based remote user authentication scheme using smart cards. Journal of Network and Computer Applications 2010; 33:1-5.
    • (2010) Journal of Network and Computer Applications , vol.33 , pp. 1-5
    • Li, C.T.1    Hwang, M.S.2
  • 37
    • 84928801756 scopus 로고    scopus 로고
    • A secure and efficient ECC-based user anonymity preserving single sign-on scheme for distributed computer networks
    • Odelu V, Das AK, Goswami A. A secure and efficient ECC-based user anonymity preserving single sign-on scheme for distributed computer networks. Security and Communication Networks 2014. DOI: 10.1002/sec.1139.
    • (2014) Security and Communication Networks
    • Odelu, V.1    Das, A.K.2    Goswami, A.3
  • 38
    • 84928813527 scopus 로고    scopus 로고
    • An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks
    • Chatterjee S, Das AK. An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks. Security and Communication Networks 2014. DOI: 10.1002/sec.1140.
    • (2014) Security and Communication Networks
    • Chatterjee, S.1    Das, A.K.2
  • 39
    • 84905842091 scopus 로고    scopus 로고
    • A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards
    • Mishra D, Das AK, Mukhopadhyay S. A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards. Expert Systems with Applications 2014; 41(18):8129-8143.
    • (2014) Expert Systems with Applications , vol.41 , Issue.18 , pp. 8129-8143
    • Mishra, D.1    Das, A.K.2    Mukhopadhyay, S.3
  • 40
    • 84953361845 scopus 로고    scopus 로고
    • A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card
    • Mishra D, Das AK, Mukhopadhyay S. A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card. Peer-to-Peer Networking and Applications 2014. DOI: 10.1007/s12083-014-0321-z.
    • (2014) Peer-to-Peer Networking and Applications
    • Mishra, D.1    Das, A.K.2    Mukhopadhyay, S.3
  • 41
    • 77954920932 scopus 로고    scopus 로고
    • An efficient dynamic group key agreement protocol for imbalanced wireless networks
    • Chuang YH, Tseng YM. An efficient dynamic group key agreement protocol for imbalanced wireless networks. International Journal of Network Management 2010; 20(4):167-180.
    • (2010) International Journal of Network Management , vol.20 , Issue.4 , pp. 167-180
    • Chuang, Y.H.1    Tseng, Y.M.2
  • 42
    • 78651389846 scopus 로고    scopus 로고
    • A simple and generic construction of authenticated encryption with associated data
    • Sarkar P. A simple and generic construction of authenticated encryption with associated data. ACM Transactions on Information and System Security 2010; 13(4):33.
    • (2010) ACM Transactions on Information and System Security , vol.13 , Issue.4 , pp. 33
    • Sarkar, P.1
  • 43
    • 30744432873 scopus 로고    scopus 로고
    • Some observations on the theory of cryptographic hash functions
    • Stinson DR. Some observations on the theory of cryptographic hash functions. Designs, Codes and Cryptography 2006; 38(2):259-277.
    • (2006) Designs, Codes and Cryptography , vol.38 , Issue.2 , pp. 259-277
    • Stinson, D.R.1
  • 44
  • 46
    • 84973579138 scopus 로고    scopus 로고
    • [Accessed on March 2013].
    • Automated Validation of Internet Security Protocols and Applications. Available at: http://www.avispa-project.org/package/usermanual.pdf [Accessed on March 2013].
  • 47
    • 84973539083 scopus 로고    scopus 로고
    • Tallinn
    • van Oheimb D. The high-level protocol specification language HLPSL developed in the EU project AVISPA, (Tallinn, 2005; 1-17.
    • (2005) , pp. 1-17
    • van Oheimb, D.1
  • 48
    • 84973568609 scopus 로고    scopus 로고
    • [Accessed on October 2014].
    • Automated validation of internet security protocols and applications. AVISPAWebTool. Available at http://www.avispa-project.org/web-interface/expert.php/ [Accessed on October 2014].
  • 49
    • 84938898177 scopus 로고    scopus 로고
    • An efficient and novel three-factor user authentication scheme for large-scale heterogeneous wireless sensor networks
    • In press.
    • Das AK. An efficient and novel three-factor user authentication scheme for large-scale heterogeneous wireless sensor networks. International Journal of Communication Networks and Distributed Systems 2015. In press.
    • (2015) International Journal of Communication Networks and Distributed Systems
    • Das, A.K.1
  • 50
    • 84973568607 scopus 로고    scopus 로고
    • U.S. Department of Commerce, April 1995. Accessed on November 2010.
    • FIPS PUB 180-1 NationalInstituteofStandardsandTechnology(NIST). U.S. Department of Commerce, April 1995. Accessed on November 2010.
  • 51
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest RL, Shamir A, Adleman LM. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 1978; 21(2):120-126.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.