An improved E-DRM scheme for mobile environments

Journal of Information Security and Applications - Tập 39 - Trang 19-30 - 2018
Cheng-Chi Lee1,2, Chun-Ta Li3, Zhi-Wei Chen1, Yan-Ming Lai4, Jiann-Cherng Shieh5
1Department of Library and Information Science, Fu Jen Catholic University, No. 510, Zhongzheng Rd., Xinzhuang Dist., New Taipei City 24205, Taiwan, ROC
2Department of Photonics and Communication Engineering, Asia University, Taichung 413, Taiwan, ROC
3Department of Information Management, Tainan University of Technology, Zhong Jheng Road, Tainan 710, Taiwan, ROC
4Department of Computer Science and Information Engineering, National Taiwan University, No. 1, Sec. 4, Roosevelt Rd., Taipei City 10617, Taiwan, ROC
5Graduate Institute of Library & Information Studies, National Taiwan Normal University, Taipei 10610, Taiwan, ROC

Tài liệu tham khảo

Ali, 2017, SeDaSC: secure data sharing in clouds, IEEEE Syst J, 11, 395, 10.1109/JSYST.2014.2379646 Burnett, 2007, A biometric identity based signature scheme, Int J Network Secur, 5, 317 Burrows, 1989, A logic of authentication, vol. 426, no. 1871 Chang, 2013, A practical secure and efficient enterprise digital rights management mechanism suitable for mobile environment, Secur Commun Networks, 6, 972, 10.1002/sec.647 Chang, 2010, An efficient and reliable E-DRM scheme for mobile environments, Expert Syst Appl, 37, 6176, 10.1016/j.eswa.2010.02.110 Chen, 2008, A secure and traceable E-DRM system based on mobile device, Expert Syst Appl, 35, 878, 10.1016/j.eswa.2007.07.029 Dodis, 2004, Fuzzy extractors: how to generate strong keys from biometrics and other noisy data Dolev, 1983, On the security of public key protocols, IEEE Trans Inf Theory, 29, 198, 10.1109/TIT.1983.1056650 He, 2014, Enhanced three-factor security protocol for consumer USB mass storage devices, IEEE Trans Consum Electron, 60, 30, 10.1109/TCE.2014.6780922 Huang, 2013, Secure and privacy-preserving DRM scheme using homomorphic encryption in cloud computing, J China Univ Posts Telecommun, 20, 88, 10.1016/S1005-8885(13)60113-2 Jain, 2003, An introduction to biometric recognition, IEEE Trans Circuits Syst Video Technol, 14, 4, 10.1109/TCSVT.2003.818349 Kamal, 2011, A symmetric bio-hash function based on fingerprint minutiae and principal curves approach, vol. 1–3 Kim, 2010, A robust and flexible digital rights management system for home networks, J Syst Software, 83, 2431, 10.1016/j.jss.2010.04.064 Ku, 2004, Survey on the technological aspects of digital rights management, vol. 3225, 391 Li, 2010, An efficient biometric-based remote user authentication scheme using smart cards, J Netw Comput Appl, 33, 1, 10.1016/j.jnca.2009.08.001 Liu, 2015, A group key distribution system based on the generalized Aryabhata remainder theorem for enterprise digital rights management, J Inf Hiding Multim Signal Process, 6, 140 Mishra, 2014, A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards, Expert Syst Appl, 41, 8129, 10.1016/j.eswa.2014.07.004 Mishra, 2015, An anonymous and secure biometric-based enterprise digital rights management system for mobile environment, Secur Commun Networks, 8, 3383, 10.1002/sec.1266 Mishra, 2014, Cryptanalysis of Yang et al.’s digital rights management authentication scheme based on smart card, Recent Trends Comput Networks Distrib Syst Secur, 420, 288, 10.1007/978-3-642-54525-2_26 Pankanti, 2003, Biometric recognition: security and privacy concerns, IEEE Secur Privacy Mag, 1, 33, 10.1109/MSECP.2003.1193209 Ratha, 1996, A real-time matching system for large fingerprint databases, IEEE Trans Pattern Anal Mach Intell, 18, 799, 10.1109/34.531800 Rosset, 2005, A DRM architecture to distribute and protect digital contents using digital licenses, 422 Stinson, 2006, Some observations on the theory of cryptographic hash functions, Des Codes Cryptograph, 38, 259, 10.1007/s10623-005-6344-y Subramanya, 2008, Digital rights management, IEEE Potentials, 25, 31, 10.1109/MP.2006.1649008 Wang, 2011, CS-DRM: a cloud-based SIM DRM scheme for mobile Internet, EURASIP J Wireless Commun Networking, 10.1155/2011/837209 Yang, 2013, Enhanced digital rights management authentication scheme based on smart card, IET Inf Secur, 7, 189, 10.1049/iet-ifs.2012.0191 Zhang, 2015, Provable secure and efficient digital rights management authentication scheme using smart card based on elliptic curve cryptography, Math Problems Eng, 2015, 1 Zhang, 2009, A DRM authentication scheme based on smart-card, 202 Zeng, 2012, Sensitivity analysis of loss of corporate efficiency and productivity associated with enterprise DRM technology Zeng, 2011, Quantitative evaluation of enterprise DRM technology, Electron Notes Theor Comput Sci, 275, 159, 10.1016/j.entcs.2011.09.011 Zou, 2010, Phosphor: a cloud based DRM scheme with SIM Card, 459