An improved E-DRM scheme for mobile environments
Tài liệu tham khảo
Ali, 2017, SeDaSC: secure data sharing in clouds, IEEEE Syst J, 11, 395, 10.1109/JSYST.2014.2379646
Burnett, 2007, A biometric identity based signature scheme, Int J Network Secur, 5, 317
Burrows, 1989, A logic of authentication, vol. 426, no. 1871
Chang, 2013, A practical secure and efficient enterprise digital rights management mechanism suitable for mobile environment, Secur Commun Networks, 6, 972, 10.1002/sec.647
Chang, 2010, An efficient and reliable E-DRM scheme for mobile environments, Expert Syst Appl, 37, 6176, 10.1016/j.eswa.2010.02.110
Chen, 2008, A secure and traceable E-DRM system based on mobile device, Expert Syst Appl, 35, 878, 10.1016/j.eswa.2007.07.029
Dodis, 2004, Fuzzy extractors: how to generate strong keys from biometrics and other noisy data
Dolev, 1983, On the security of public key protocols, IEEE Trans Inf Theory, 29, 198, 10.1109/TIT.1983.1056650
He, 2014, Enhanced three-factor security protocol for consumer USB mass storage devices, IEEE Trans Consum Electron, 60, 30, 10.1109/TCE.2014.6780922
Huang, 2013, Secure and privacy-preserving DRM scheme using homomorphic encryption in cloud computing, J China Univ Posts Telecommun, 20, 88, 10.1016/S1005-8885(13)60113-2
Jain, 2003, An introduction to biometric recognition, IEEE Trans Circuits Syst Video Technol, 14, 4, 10.1109/TCSVT.2003.818349
Kamal, 2011, A symmetric bio-hash function based on fingerprint minutiae and principal curves approach, vol. 1–3
Kim, 2010, A robust and flexible digital rights management system for home networks, J Syst Software, 83, 2431, 10.1016/j.jss.2010.04.064
Ku, 2004, Survey on the technological aspects of digital rights management, vol. 3225, 391
Li, 2010, An efficient biometric-based remote user authentication scheme using smart cards, J Netw Comput Appl, 33, 1, 10.1016/j.jnca.2009.08.001
Liu, 2015, A group key distribution system based on the generalized Aryabhata remainder theorem for enterprise digital rights management, J Inf Hiding Multim Signal Process, 6, 140
Mishra, 2014, A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards, Expert Syst Appl, 41, 8129, 10.1016/j.eswa.2014.07.004
Mishra, 2015, An anonymous and secure biometric-based enterprise digital rights management system for mobile environment, Secur Commun Networks, 8, 3383, 10.1002/sec.1266
Mishra, 2014, Cryptanalysis of Yang et al.’s digital rights management authentication scheme based on smart card, Recent Trends Comput Networks Distrib Syst Secur, 420, 288, 10.1007/978-3-642-54525-2_26
Pankanti, 2003, Biometric recognition: security and privacy concerns, IEEE Secur Privacy Mag, 1, 33, 10.1109/MSECP.2003.1193209
Ratha, 1996, A real-time matching system for large fingerprint databases, IEEE Trans Pattern Anal Mach Intell, 18, 799, 10.1109/34.531800
Rosset, 2005, A DRM architecture to distribute and protect digital contents using digital licenses, 422
Stinson, 2006, Some observations on the theory of cryptographic hash functions, Des Codes Cryptograph, 38, 259, 10.1007/s10623-005-6344-y
Subramanya, 2008, Digital rights management, IEEE Potentials, 25, 31, 10.1109/MP.2006.1649008
Wang, 2011, CS-DRM: a cloud-based SIM DRM scheme for mobile Internet, EURASIP J Wireless Commun Networking, 10.1155/2011/837209
Yang, 2013, Enhanced digital rights management authentication scheme based on smart card, IET Inf Secur, 7, 189, 10.1049/iet-ifs.2012.0191
Zhang, 2015, Provable secure and efficient digital rights management authentication scheme using smart card based on elliptic curve cryptography, Math Problems Eng, 2015, 1
Zhang, 2009, A DRM authentication scheme based on smart-card, 202
Zeng, 2012, Sensitivity analysis of loss of corporate efficiency and productivity associated with enterprise DRM technology
Zeng, 2011, Quantitative evaluation of enterprise DRM technology, Electron Notes Theor Comput Sci, 275, 159, 10.1016/j.entcs.2011.09.011
Zou, 2010, Phosphor: a cloud based DRM scheme with SIM Card, 459