-
2
-
-
33845230194
-
Survey on the technological aspects of digital rights management
-
in, Springer, Berlin Heidelberg
-
Ku W, Chi C, Survey on the technological aspects of digital rights management., in Information Security, Lecture Notes in Computer Science, LNCS, vol.3225, Springer, Berlin Heidelberg, 2004; 391-403.
-
(2004)
Information Security, Lecture Notes in Computer Science, LNCS
, vol.3225
, pp. 391-403
-
-
Ku, W.1
Chi, C.2
-
5
-
-
84896344547
-
-
[Accessed on February 2015].
-
Digital Rights Management. IEEE Emerging Technology portal, 2006-2012. Available at http://www.ieee.org/about/ technologies/emerging/digital/_rights.pdf. [Accessed on February 2015].
-
IEEE Emerging Technology portal, 2006-2012
-
-
-
6
-
-
84973581160
-
-
[Accessed on November 2014].
-
Kaspersky lab Internal ITThreats in Europe 2006. Available at http://www.viruslist.com/en/analysis?pubid=204791935. [Accessed on November 2014].
-
-
-
-
7
-
-
84869390518
-
Sensitivity analysis of loss of corporate efficiency and productivity associated with enterprise DRM technology
-
University of Economics in Prague, Czech Republic
-
Zeng W, Liu K. Sensitivity analysis of loss of corporate efficiency and productivity associated with enterprise DRM technology. 2012 Seventh International Conference on Availability, Reliability and Security (ARES), University of Economics in Prague, Czech Republic, 2012; 445-453.
-
(2012)
2012 Seventh International Conference on Availability, Reliability and Security (ARES)
, pp. 445-453
-
-
Zeng, W.1
Liu, K.2
-
10
-
-
84973556196
-
-
[Accessed on November 2014].
-
Adobe Livecycle Document Security (2009). Available at http://www.adobe.com/content/dam/Adobe/en/devnet/ livecycle/pdfs/rm/_security/_tg.pdf [Accessed on November 2014].
-
-
-
-
12
-
-
80052950719
-
Mesmerize: an open framework for enterprise security management
-
Australian Computer Society Inc., Dunedin, New Zealand
-
Bradley D, Josang A. Mesmerize: an open framework for enterprise security management. Proceedings of the Second Workshop on Australasian Information Security, Data Mining and Web Intelligence, and Software Internationalisation-Volume 32, Australian Computer Society Inc., Dunedin, New Zealand, 2004; 37-42.
-
(2004)
Proceedings of the Second Workshop on Australasian Information Security, Data Mining and Web Intelligence, and Software Internationalisation-Volume 32
, pp. 37-42
-
-
Bradley, D.1
Josang, A.2
-
13
-
-
84973565961
-
-
[Accessed on November 2014].
-
Authentica Delivers Next-Generation Enterprise Rights Management Platform (2005). Available at http://www.authentica.com/ news/ pr2005/ 02-14-2005-ARM.aspx [Accessed on November 2014].
-
(2005)
-
-
-
14
-
-
84973566207
-
-
Microsoft Windows Right Management Services System (2007). Available at http://technet.microsoft.com/en-us/magazine/2006.10.howitworks.aspx [Accessed on November 2014].
-
(2007)
[Accessed on November 2014].
-
-
-
15
-
-
84973556193
-
Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
-
Van Wie DM, Weber RP. Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels (1999). US Patent 5, 943, 422.
-
(1999)
-
-
Van Wie, D.M.1
Weber, R.P.2
-
17
-
-
44949104171
-
A secure and traceable E-DRM system based on mobile device
-
Chen CL. A secure and traceable E-DRM system based on mobile device. Expert Systems with Applications 2008; 35(3):878-886.
-
(2008)
Expert Systems with Applications
, vol.35
, Issue.3
, pp. 878-886
-
-
Chen, C.L.1
-
18
-
-
80052413706
-
An efficient and reliable E-DRM scheme for mobile environments
-
Chang CC, Yang JH, Wang DW. An efficient and reliable E-DRM scheme for mobile environments. Expert Systems with Applications 2008; 37(9):6176-6181.
-
(2008)
Expert Systems with Applications
, vol.37
, Issue.9
, pp. 6176-6181
-
-
Chang, C.C.1
Yang, J.H.2
Wang, D.W.3
-
19
-
-
84880312349
-
A practical secure and efficient enterprise digital rights management mechanism suitable for mobile environment
-
Chang CC, Chang SC, Yang JH. A practical secure and efficient enterprise digital rights management mechanism suitable for mobile environment. Security and Communication Networks 2013; 6(8):972-984.
-
(2013)
Security and Communication Networks
, vol.6
, Issue.8
, pp. 972-984
-
-
Chang, C.C.1
Chang, S.C.2
Yang, J.H.3
-
20
-
-
84892444048
-
An authenticated group key distribution protocol based on the generalized Chinese remainder theorem
-
Guo C, Chang CC. An authenticated group key distribution protocol based on the generalized Chinese remainder theorem. International Journal of Communication Systems 2014; 27(1):126-134.
-
(2014)
International Journal of Communication Systems
, vol.27
, Issue.1
, pp. 126-134
-
-
Guo, C.1
Chang, C.C.2
-
22
-
-
84908416925
-
A group key distribution system based on the generalized Aryabhata remainder theorem for enterprise digital rights management
-
Liu Y, Chang CC, Chang SC. A group key distribution system based on the generalized Aryabhata remainder theorem for enterprise digital rights management. Journal of Information Hiding and Multimedia Signal Processing 2015; 6(1):140-153.
-
(2015)
Journal of Information Hiding and Multimedia Signal Processing
, vol.6
, Issue.1
, pp. 140-153
-
-
Liu, Y.1
Chang, C.C.2
Chang, S.C.3
-
23
-
-
77951858876
-
Generalized Aryabhata remainder theorem
-
Chang CC, Yeh JS, Yang JH. Generalized Aryabhata remainder theorem. International Journal of Innovative Computing, Information and Control 2010; 6(4):1865-1871.
-
(2010)
International Journal of Innovative Computing, Information and Control
, vol.6
, Issue.4
, pp. 1865-1871
-
-
Chang, C.C.1
Yeh, J.S.2
Yang, J.H.3
-
24
-
-
84892172543
-
Secure and privacy-preserving DRM scheme using homomorphic encryption in cloud computing
-
Huang QL, Yang Y, Fu J, Niu X. Secure and privacy-preserving DRM scheme using homomorphic encryption in cloud computing. The Journal of China Universities of Posts and Telecommunications 2013; 20(6):88-95.
-
(2013)
The Journal of China Universities of Posts and Telecommunications
, vol.20
, Issue.6
, pp. 88-95
-
-
Huang, Q.L.1
Yang, Y.2
Fu, J.3
Niu, X.4
-
26
-
-
79952182083
-
CS-DRM: a cloud-based SIM DRM scheme for mobile Internet
-
Wang C, Zou P, Liu Z, Wang J. CS-DRM: a cloud-based SIM DRM scheme for mobile Internet. EURASIP Journal on Wireless Communications and Networking 2011; 2011:1-19, Article ID 837209. DOI: 10.1155/2011/837209.
-
(2011)
EURASIP Journal on Wireless Communications and Networking
, vol.2011
, pp. 1-19
-
-
Wang, C.1
Zou, P.2
Liu, Z.3
Wang, J.4
-
27
-
-
84860725458
-
Privacy-preserving DRM for cloud computing
-
IEEE, Fukuoka, Japan
-
Petrlic R, Sorge C. Privacy-preserving DRM for cloud computing. 26th International Conference on Advanced Information Networking and Applications Workshops (WAINA), IEEE, Fukuoka, Japan, 2012; 1286-1291.
-
(2012)
26th International Conference on Advanced Information Networking and Applications Workshops (WAINA)
, pp. 1286-1291
-
-
Petrlic, R.1
Sorge, C.2
-
31
-
-
0030212761
-
A real-time matching system for large fingerprint databases
-
Ratha N, Karu K, Chen S, Jain A. A real-time matching system for large fingerprint databases. IEEE Transactions on Pattern Analysis and Machine Intelligence 1996; 18(8):799-813.
-
(1996)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.18
, Issue.8
, pp. 799-813
-
-
Ratha, N.1
Karu, K.2
Chen, S.3
Jain, A.4
-
32
-
-
70349792182
-
An efficient biometric-based remote user authentication scheme using smart cards
-
Li CT, Hwang MS. An efficient biometric-based remote user authentication scheme using smart cards. Journal of Network and Computer Applications 2010; 33:1-5.
-
(2010)
Journal of Network and Computer Applications
, vol.33
, pp. 1-5
-
-
Li, C.T.1
Hwang, M.S.2
-
33
-
-
35048865463
-
Fuzzy extractors: how to generate strong keys from biometrics and other noisy data
-
Springer, Berlin Heidelberg
-
Dodis Y, Reyzin L, Smith A. Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. Advances in Cryptology - EUROCRYPT 2004, Lecture Notes in Computer Science, vol. 3027, Springer, Berlin Heidelberg, 2004; 523-540.
-
(2004)
Advances in Cryptology - EUROCRYPT 2004, Lecture Notes in Computer Science
, vol.3027
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
34
-
-
38149029815
-
A biometric identity based signature scheme
-
Burnett A, Byrne F, Dowling T, Duffy A. A biometric identity based signature scheme. International Journal of Network Security 2007; 5(3):317-326.
-
(2007)
International Journal of Network Security
, vol.5
, Issue.3
, pp. 317-326
-
-
Burnett, A.1
Byrne, F.2
Dowling, T.3
Duffy, A.4
-
35
-
-
84898048082
-
Enhanced three-factor security protocol for consumer USB mass storage devices
-
He D, Kumar N, Lee JH, Sherratt R. Enhanced three-factor security protocol for consumer USB mass storage devices. IEEE Transactions on Consumer Electronics 2014; 60(1):30-37.
-
(2014)
IEEE Transactions on Consumer Electronics
, vol.60
, Issue.1
, pp. 30-37
-
-
He, D.1
Kumar, N.2
Lee, J.H.3
Sherratt, R.4
-
37
-
-
84928801756
-
A secure and efficient ECC-based user anonymity preserving single sign-on scheme for distributed computer networks
-
Odelu V, Das AK, Goswami A. A secure and efficient ECC-based user anonymity preserving single sign-on scheme for distributed computer networks. Security and Communication Networks 2014. DOI: 10.1002/sec.1139.
-
(2014)
Security and Communication Networks
-
-
Odelu, V.1
Das, A.K.2
Goswami, A.3
-
38
-
-
84928813527
-
An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks
-
Chatterjee S, Das AK. An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks. Security and Communication Networks 2014. DOI: 10.1002/sec.1140.
-
(2014)
Security and Communication Networks
-
-
Chatterjee, S.1
Das, A.K.2
-
39
-
-
84905842091
-
A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards
-
Mishra D, Das AK, Mukhopadhyay S. A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards. Expert Systems with Applications 2014; 41(18):8129-8143.
-
(2014)
Expert Systems with Applications
, vol.41
, Issue.18
, pp. 8129-8143
-
-
Mishra, D.1
Das, A.K.2
Mukhopadhyay, S.3
-
40
-
-
84953361845
-
A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card
-
Mishra D, Das AK, Mukhopadhyay S. A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card. Peer-to-Peer Networking and Applications 2014. DOI: 10.1007/s12083-014-0321-z.
-
(2014)
Peer-to-Peer Networking and Applications
-
-
Mishra, D.1
Das, A.K.2
Mukhopadhyay, S.3
-
41
-
-
77954920932
-
An efficient dynamic group key agreement protocol for imbalanced wireless networks
-
Chuang YH, Tseng YM. An efficient dynamic group key agreement protocol for imbalanced wireless networks. International Journal of Network Management 2010; 20(4):167-180.
-
(2010)
International Journal of Network Management
, vol.20
, Issue.4
, pp. 167-180
-
-
Chuang, Y.H.1
Tseng, Y.M.2
-
42
-
-
78651389846
-
A simple and generic construction of authenticated encryption with associated data
-
Sarkar P. A simple and generic construction of authenticated encryption with associated data. ACM Transactions on Information and System Security 2010; 13(4):33.
-
(2010)
ACM Transactions on Information and System Security
, vol.13
, Issue.4
, pp. 33
-
-
Sarkar, P.1
-
43
-
-
30744432873
-
Some observations on the theory of cryptographic hash functions
-
Stinson DR. Some observations on the theory of cryptographic hash functions. Designs, Codes and Cryptography 2006; 38(2):259-277.
-
(2006)
Designs, Codes and Cryptography
, vol.38
, Issue.2
, pp. 259-277
-
-
Stinson, D.R.1
-
44
-
-
84870657665
-
An novel three-party authenticated key exchange protocol using one-time key
-
Lv C, Ma M, Li H, Ma J, Zhang Y. An novel three-party authenticated key exchange protocol using one-time key. Journal of Network and Computer Applications 2013; 36(1):498-503.
-
(2013)
Journal of Network and Computer Applications
, vol.36
, Issue.1
, pp. 498-503
-
-
Lv, C.1
Ma, M.2
Li, H.3
Ma, J.4
Zhang, Y.5
-
46
-
-
84973579138
-
-
[Accessed on March 2013].
-
Automated Validation of Internet Security Protocols and Applications. Available at: http://www.avispa-project.org/package/usermanual.pdf [Accessed on March 2013].
-
-
-
-
47
-
-
84973539083
-
-
Tallinn
-
van Oheimb D. The high-level protocol specification language HLPSL developed in the EU project AVISPA, (Tallinn, 2005; 1-17.
-
(2005)
, pp. 1-17
-
-
van Oheimb, D.1
-
48
-
-
84973568609
-
-
[Accessed on October 2014].
-
Automated validation of internet security protocols and applications. AVISPAWebTool. Available at http://www.avispa-project.org/web-interface/expert.php/ [Accessed on October 2014].
-
-
-
-
49
-
-
84938898177
-
An efficient and novel three-factor user authentication scheme for large-scale heterogeneous wireless sensor networks
-
In press.
-
Das AK. An efficient and novel three-factor user authentication scheme for large-scale heterogeneous wireless sensor networks. International Journal of Communication Networks and Distributed Systems 2015. In press.
-
(2015)
International Journal of Communication Networks and Distributed Systems
-
-
Das, A.K.1
-
50
-
-
84973568607
-
-
U.S. Department of Commerce, April 1995. Accessed on November 2010.
-
FIPS PUB 180-1 NationalInstituteofStandardsandTechnology(NIST). U.S. Department of Commerce, April 1995. Accessed on November 2010.
-
-
-
-
51
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest RL, Shamir A, Adleman LM. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 1978; 21(2):120-126.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
53
-
-
0003851399
-
-
2nd edn. John Wiley and Sons Inc, New York, U.S.A, 15.
-
Schneier B. Applied Cryptography, Protocols, Algorithms, and Source Code in C 2nd edn. John Wiley and Sons Inc, New York, U.S.A, 1996, 15.
-
(1996)
Applied Cryptography, Protocols, Algorithms, and Source Code in C
-
-
Schneier, B.1
|