Design and Implementation of DRM Proxy for DRM Cloud Service

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DRM Cloud Architecture and Service Scenario for Content Protection

The smart devices and cloud computing technology have been introduced into a new content service such as N-Screen service. The DRM(digital rights management) techniques have been rapidly developed in accordance with the new service environment after the awareness on the importance of DRM technology. In spite of the technical advancement of DRM, it is being taken as an unwelcome thing by the con...

متن کامل

DRM - the BBC World Service distribution chain

At the basic RF-channel level, DRM shares many characteristics with other modern systems such as DVB-T and DAB. It utilises Coded Orthogonal Frequency Division Multiplexing (COFDM) [1][2] to combat noise, narrowband fading and multipath. Broadcasts can be synchronized to support Single-Frequency Networks (SFNs) and Multi-Frequency Networks (MFNs). One DRM service normally occupies one AM channe...

متن کامل

An efficient proxy signature scheme in home network DRM

In this paper we overview the existing home network DRM schemes and especially Philips’ invention. Then we propose to use the proxy signature to simplify the authentication of certificate chain in Philips’ scheme. And we also give an efficient scheme of proxy signature based on the characters of certificate chain. We then give a detailed security analysis to show that our scheme meets the six p...

متن کامل

A White-Box DES Implementation for DRM Applications

For digital rights management (drm) software implementations incorporating cryptography, white-box cryptography (cryptographic implementation designed to withstand the white-box attack context) is more appropriate than traditional black-box cryptography. In the whitebox context, the attacker has total visibility into software implementation and execution. Our objective is to prevent extraction ...

متن کامل

An Efficient DRM Standard Protocol Implementation for Media Cards

DRM provides an effective method to protect digital contents against copyright infringement. However, existing general DRM systems cannot be directly applied to low computation-power systems such as media cards. We propose an implementation of a DRM system which is applicable to such limited environments by improving the main specifications and modifying key aspects of the cryptographic algorit...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: KIPS Transactions on Computer and Communication Systems

سال: 2013

ISSN: 2287-5891

DOI: 10.3745/ktccs.2013.2.12.553