-
1
-
-
84907899235
-
-
accessed 30.03.15
-
Accenture Video-over-internet consumer survey http://www.accenture.com/SiteCollectionDocuments/PDF/Accenture-Video-Over-Internet-Consumer-Survey-2013.pdf 2013 accessed 30.03.15
-
(2013)
Video-over-internet Consumer Survey
-
-
Accenture1
-
2
-
-
84949087827
-
-
accessed 30.03.15
-
Apple iTunes Preview 3NOW - on demand https://itunes.apple.com/au/app/3now-on-demand-for-your-iphone/id713771599?mt=8 2015 accessed 30.03.15
-
(2015)
Apple Itunes Preview. 3NOW - On Demand
-
-
-
3
-
-
84949090653
-
-
accessed 30.03.15
-
Apple Inc. HTTP live streaming overview https://developer.apple.com/library/ios/documentation/NetworkingInternet/Conceptual/StreamingMediaGuide/StreamingMediaGuide.pdf 2014 accessed 30.03.15
-
(2014)
HTTP Live Streaming Overview
-
-
Apple Inc.1
-
5
-
-
84889085369
-
A critical review of 7 years of mobile device forensics
-
K. Barmpatsalou, D. Damopoulos, G. Kambourakis, and V. Katos A critical review of 7 years of mobile device forensics Digit Investig 10 4 2013 323 349
-
(2013)
Digit Investig
, vol.10
, Issue.4
, pp. 323-349
-
-
Barmpatsalou, K.1
Damopoulos, D.2
Kambourakis, G.3
Katos, V.4
-
6
-
-
84945119254
-
Entity authentication and key distribution
-
Springer-Verlag
-
M. Bellare, and P. Rogaway Entity authentication and key distribution Proceedings of the Advances in Cryptology, vol. 773, pp. 232-249, Springer-Verlag 1993
-
(1993)
Proceedings of the Advances in Cryptology
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
7
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
Springer-Verlag
-
M. Bellare, D. Pointcheval, and P. Rogaway Authenticated key exchange secure against dictionary attacks In Proceedings of EUROCRYPT, vol. 1807/2000 of LNCS, pp. 139-155, Springer-Verlag 2000
-
(2000)
Proceedings of EUROCRYPT, Vol. 1807/2000 of LNCS
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
8
-
-
84904857300
-
Exploiting P2P scalability for grant authorization in digital rights management solutions
-
P. Bellini, P. Nesi, and F. Pazzaglia Exploiting P2P scalability for grant authorization in digital rights management solutions Mult Tool Appl 72 2 2014 1611 1637
-
(2014)
Mult Tool Appl
, vol.72
, Issue.2
, pp. 1611-1637
-
-
Bellini, P.1
Nesi, P.2
Pazzaglia, F.3
-
9
-
-
84908152579
-
Combination of DRM and mobile code: A practice to protect tv contents and applications on android smartphone
-
Los Angeles, CA, IEEE
-
Chen T., X. Lanchi, and W. Xingjun Combination of DRM and mobile code: a practice to protect tv contents and applications on android smartphone Proceedings of the International Conference on Networking and Distributed Computing, Los Angeles, CA, IEEE, pp. 89-93 2013
-
(2013)
Proceedings of the International Conference on Networking and Distributed Computing
, pp. 89-93
-
-
Chen, T.1
Lanchi, X.2
Xingjun, W.3
-
10
-
-
33845638668
-
Refuting security proofs for tripartite key exchange with model checker in planning problem setting
-
K.-K.R. Choo Refuting security proofs for tripartite key exchange with model checker in planning problem setting Proceedings of the IEEE Computer Security Foundations Workshop (CSFW), pp. 297-308 2006
-
(2006)
Proceedings of the IEEE Computer Security Foundations Workshop (CSFW)
, pp. 297-308
-
-
Choo, K.-K.R.1
-
11
-
-
80955142795
-
The cyber threat landscape: Challenges and future research directions
-
K.-K.R. Choo The cyber threat landscape: challenges and future research directions Comput Secur 30 8 2011 719 731
-
(2011)
Comput Secur
, vol.30
, Issue.8
, pp. 719-731
-
-
Choo, K.-K.R.1
-
13
-
-
84903216318
-
Peer-assisted VoD systems: An efficient modeling framework
-
D. Ciullo, V. Martina, M. Garetto, E. Leonardi, and G.L. Torrisi Peer-assisted VoD systems: an efficient modeling framework IEEE Tran Parallel Distrib Syst 25 7 2014 1852 1863
-
(2014)
IEEE Tran Parallel Distrib Syst
, vol.25
, Issue.7
, pp. 1852-1863
-
-
Ciullo, D.1
Martina, V.2
Garetto, M.3
Leonardi, E.4
Torrisi, G.L.5
-
14
-
-
84929234268
-
An anonymous and secure biometric-based enterprise digital rights management system for mobile environment
-
In press
-
A.K. Das, D. Mishra, and S. Mukhopadhyay An anonymous and secure biometric-based enterprise digital rights management system for mobile environment Secur Commun Netw 2015 10.1002/sec.1266 In press
-
(2015)
Secur Commun Netw
-
-
Das, A.K.1
Mishra, D.2
Mukhopadhyay, S.3
-
15
-
-
84912008171
-
Exfiltrating data from Android devices
-
Q. Do, B. Martini, and K.-K.R. Choo Exfiltrating data from Android devices Comput Secur 48 2015 74 91
-
(2015)
Comput Secur
, vol.48
, pp. 74-91
-
-
Do, Q.1
Martini, B.2
Choo, K.-K.R.3
-
16
-
-
0020720357
-
On the security of public key protocols
-
D. Dolev, and Yao A.C. On the security of public key protocols IEEE Trans Inf Technol 29 2 1983 198 208
-
(1983)
IEEE Trans Inf Technol
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.C.2
-
20
-
-
84995374597
-
If Piracy Is the Problem, Is DRM the Answer?
-
S. Haber, B. Horne, J. Pato, T. Sander, and R.E. Tarjan If Piracy Is the Problem, Is DRM the Answer? Digital Rights Management: technological, economic, legal and political aspects (LNCS 2770), pp. 224-233 2003
-
(2003)
Digital Rights Management: Technological, Economic, Legal and Political Aspects (LNCS 2770)
, pp. 224-233
-
-
Haber, S.1
Horne, B.2
Pato, J.3
Sander, T.4
Tarjan, R.E.5
-
21
-
-
79952848974
-
DRM protected dynamic adaptive HTTP streaming
-
San Jose, CA, USA, ACM
-
F. Hartung, S. Kesici, and D. Catrein DRM protected dynamic adaptive HTTP streaming Proceedings of the ACM conference on Multimedia systems. San Jose, CA, USA, ACM, pp. 277-282 2011
-
(2011)
Proceedings of the ACM Conference on Multimedia Systems
, pp. 277-282
-
-
Hartung, F.1
Kesici, S.2
Catrein, D.3
-
22
-
-
84905648627
-
Secure and efficient digital rights management mechanisms with privacy protection
-
Huang J.-J., Lu P.-C., W.-S. Juang, Fan C.-I., Lin Z.-Y., and Lin C.-H. Secure and efficient digital rights management mechanisms with privacy protection J Shanghai Jiaotong Univ 19 4 2014 443 447
-
(2014)
J Shanghai Jiaotong Univ
, vol.19
, Issue.4
, pp. 443-447
-
-
Huang, J.-J.1
Lu, P.-C.2
Juang, W.-S.3
Fan, C.-I.4
Lin, Z.-Y.5
Lin, C.-H.6
-
23
-
-
84897488123
-
A method for trusted usage control over digital contents based on cloud computing
-
Huang T., Zhang Z., Chen Q., and Chang Y. A method for trusted usage control over digital contents based on cloud computing Int J Digit Content Technol Appl 7 4 2013 795 802
-
(2013)
Int J Digit Content Technol Appl
, vol.7
, Issue.4
, pp. 795-802
-
-
Huang, T.1
Zhang, Z.2
Chen, Q.3
Chang, Y.4
-
24
-
-
33845409136
-
Towards Meeting the Privacy Challenge: Adapting DRM
-
Washington, DC, USA
-
L. Korba, and S. Kenny Towards Meeting the Privacy Challenge: adapting DRM Digital Rights Management: ACM CCS-9 Workshop, Washington, DC, USA, pp. 118-136 2002
-
(2002)
Digital Rights Management: ACM CCS-9 Workshop
, pp. 118-136
-
-
Korba, L.1
Kenny, S.2
-
25
-
-
84949101193
-
An efficient Fibonacci based content distribution scheme for interactive VoD streaming
-
G. Kowsalya, T. Sudha, D. Jeeva, and M. Parthiban An efficient Fibonacci based content distribution scheme for interactive VoD streaming i-Manager's J Info Tech 2 2 2013 32 39
-
(2013)
I-Manager's J Info Tech
, vol.2
, Issue.2
, pp. 32-39
-
-
Kowsalya, G.1
Sudha, T.2
Jeeva, D.3
Parthiban, M.4
-
27
-
-
84890026492
-
-
accessed 30.03.15
-
A. Langley Maintaining digital certificate security http://googleonlinesecurity.blogspot.com.au/2015/03/maintaining-digital-certificate-security.html 2015 accessed 30.03.15
-
(2015)
Maintaining Digital Certificate Security
-
-
Langley, A.1
-
28
-
-
7444222166
-
Digital rights management for content distribution
-
Liu Q., R. Safavi-Naini, and N. Sheppard Digital rights management for content distribution Proc AISW 21 2003 49 58
-
(2003)
Proc AISW
, vol.21
, pp. 49-58
-
-
Liu, Q.1
Safavi-Naini, R.2
Sheppard, N.3
-
29
-
-
84893377818
-
Investigating redundant internet video streaming traffic on iOS devices, causes and solutions
-
Liu Y., Wei Q., Guo L., Shen B., Chen S., and Y. Lan Investigating redundant internet video streaming traffic on iOS devices, causes and solutions IEEE Trans Mult 16 2 2014 510 520
-
(2014)
IEEE Trans Mult
, vol.16
, Issue.2
, pp. 510-520
-
-
Liu, Y.1
Wei, Q.2
Guo, L.3
Shen, B.4
Chen, S.5
Lan, Y.6
-
32
-
-
70349233074
-
Enforcing DRM policies across applications
-
ACM
-
S.K. Nair, A.S. Tanenbaum, G. Gheorghe, and B. Crispo Enforcing DRM policies across applications Digital Rights Management Workshop, ACM, pp. 87-94 2008
-
(2008)
Digital Rights Management Workshop
, pp. 87-94
-
-
Nair, S.K.1
Tanenbaum, A.S.2
Gheorghe, G.3
Crispo, B.4
-
33
-
-
84949109143
-
-
accessed 19.05.15
-
Research2Guidance Mobile health market http://www.research2guidance.com/shop/index.php/downloadable/download/sample/sample-id/262/ 2013 accessed 19.05.15
-
(2013)
Mobile Health Market
-
-
Research2guidance1
-
38
-
-
84901246064
-
Evolution, detection and analysis of malware for smart devices
-
G. Suarez-Tangil, J.E. Tapiador, P. Peris-Lopez, and A. Ribagorda Evolution, detection and analysis of malware for smart devices IEEE Commun Surv Tutor 16 2 2014 961 987
-
(2014)
IEEE Commun Surv Tutor
, vol.16
, Issue.2
, pp. 961-987
-
-
Suarez-Tangil, G.1
Tapiador, J.E.2
Peris-Lopez, P.3
Ribagorda, A.4
-
40
-
-
84863748235
-
Strengthening digital rights management using a new driver-hidden rootkit
-
W.-J. Tsaur Strengthening digital rights management using a new driver-hidden rootkit IEEE Trans Consum Electron 58 2 2012 479 483
-
(2012)
IEEE Trans Consum Electron
, vol.58
, Issue.2
, pp. 479-483
-
-
Tsaur, W.-J.1
-
41
-
-
84927598176
-
An approach to mobile multimedia digital rights management based on android
-
Prague, Czech Republic
-
Wang Z., Zhang Z., Chang Y., and Xu M. An approach to mobile multimedia digital rights management based on android Proceedings of the International Conference on Genetic and Evolutionary Computing, Prague, Czech Republic, vol. 238, pp. 239-246 2013
-
(2013)
Proceedings of the International Conference on Genetic and Evolutionary Computing
, vol.238
, pp. 239-246
-
-
Wang, Z.1
Zhang, Z.2
Chang, Y.3
Xu, M.4
-
42
-
-
84898003401
-
Identifying back doors, attack points, and surveillance mechanisms in iOS devices
-
J. Zdziarski Identifying back doors, attack points, and surveillance mechanisms in iOS devices Digit Investig 11 1 2014 3 19
-
(2014)
Digit Investig
, vol.11
, Issue.1
, pp. 3-19
-
-
Zdziarski, J.1
-
45
-
-
77956977210
-
Security and trust in digital rights management, a survey
-
Zhang Z., Pei Q., Ma J., and Yang L. Security and trust in digital rights management, a survey Int J Netw Secur 9 3 2009 247 263
-
(2009)
Int J Netw Secur
, vol.9
, Issue.3
, pp. 247-263
-
-
Zhang, Z.1
Pei, Q.2
Ma, J.3
Yang, L.4
-
46
-
-
84939264725
-
A novel approach to rights sharing-enabling digital rights management for mobile multimedia
-
Zhang Z., Wang Z., and Niu D. A novel approach to rights sharing-enabling digital rights management for mobile multimedia J Mult Tool Appl 2014 10.1007/s11042-014-2135-7
-
(2014)
J Mult Tool Appl
-
-
Zhang, Z.1
Wang, Z.2
Niu, D.3
|