SEARCH

SEARCH BY CITATION

REFERENCES

  • 1
  • 2
    EMC Corporation acquired Authentica on February 27, 2006. http://www.emc.com/domains/authentica/index.htm
  • 3
  • 4
    Arora G, Hanneghan M, Merabti M. P2P commercial digital content exchange. Electronic Commerce Research and Applications 2005; 4(3):250263.
  • 5
    Hwang SO. How viable is digital rights management. Computer 2009; 42(4):2834.
  • 6
    Liu Q, Reihaneh SN, Sheppard NP. Digital rights management for content distribution. Proceedings of Australasian Information Security Workshop Conference on ACSW frontiers, South Australia, Feb. 2003; 21: 4958.
  • 7
    Li Q, Zhang J, Gong X, Zhang Z. A novel license distribution mechanism in DRM system. Proceedings of 22nd International Conference on Advanced Information Networking and Applications-Workshops, Okinawa, Japan, Mar. 2008; 13291334.
  • 8
    Lin CC, Chiang PH. A mobile trading scheme for digital content based on digital rights. Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, Kaohsiung, Taiwan, Nov. 2008; 3: 451456.
  • 9
    Kim H, Lee Y, Park Y. A robust and flexible digital rights management system for home networks. Journal of Systems and Software 2010; 83(12):24312440.
  • 10
    Wang J, Fu X. Digital rights management (DRM) in the mobile P2P environment. Proceedings of Sixth International Conference on Wireless Communications Networking and Mobile Computing, Chengdo, China, Sep. 2010; 14.
  • 11
    Yen CT, Liaw HT, Lo NW, Liu TC, Stu J. Transparent digital rights management system with superdistribution. Proceedings of International Conference on Broadband, Wireless Computing, Communication and Applications, Fukuoka, Nov. 2010; 435440.
  • 12
    Zhang J, Li B, Zhao L, Yang SQ. License management scheme with anonymous trust for digital rights management. Proceedings of IEEE International Conference on Multimedia and Expo, Amsterdam, Jul. 2005; 257260.
  • 13
    Chen CL. A secure and traceable E-DRM system based on mobile device. Expert Systems with Applications 2008; 35(3):878886.
  • 14
    Chang CC, Yang JH, Wang DW. An efficient and reliable E-DRM scheme for mobile environments. Expert Systems with Applications 2010; 37(9):61766181.
  • 15
    Lin CC, Wu SC, Chiang PH, Chen CC. Enterprise-oriented digital rights management mechanism: eDRM. Proceedings of International Conference on Availability, Reliability and Security, Fukuoka, Mar. 2009; 923928.
  • 16
    Menezes AJ, Orschot PC, Vanstone SA. Hand-book of Applied Cryptography. CRC Press: USA, 1996.
  • 17
    Schneier B. Applied Cryptography, Protocols, Algorithms, and Source Code in C (2nd edn). John Wiley and Sons Inc: New York, U.S.A, 1996; 15.
  • 18
    Burrows M, Abadi M, Needham R. A logic of authentication. ACM Transactions on Computer Systems 1990; 8(1):1836.
  • 19
    Shoup V. Sequences of games: a tool for taming complexity in security proofs. LACR eprint Report, 2006.