Sciweavers

186 search results - page 3 / 38
» A four-layer model for security of digital rights management
Sort
View
DEXAW
2005
IEEE
164views Database» more  DEXAW 2005»
13 years 11 months ago
Mobile Digital Rights Management: Security Requirements and Copy Detection Mechanisms
This paper addresses the specification of security modules in a Mobile Digital Rights Management (DRM) approach with a focus on copy detection mechanisms. The presented DRM approa...
Miguel Soriano, Stephan Flake, Jürgen Tacken,...
IEEESP
2006
51views more  IEEESP 2006»
13 years 6 months ago
Digital Rights Management, Spyware, and Security
Edward W. Felten, J. Alex Halderman
ISCC
2005
IEEE
13 years 11 months ago
Location Dependent Digital Rights Management
In this paper we present a concept and an architecture for a location dependent Digital Rights Management system. The solution is based on a trusted hardware which incorporates th...
Thomas Mundt
DRM
2003
Springer
13 years 11 months ago
Digital rights management in a 3G mobile phone and beyond
In this paper we examine how copyright protection of digital items can be securely managed in a 3G mobile phone and other devices. First, the basic concepts, strategies, and requi...
Thomas S. Messerges, Ezzat A. Dabbish
ISW
2007
Springer
14 years 4 days ago
Enabling Fairer Digital Rights Management with Trusted Computing
Abstract. Today, digital content is routinely distributed over the Internet, and consumed in devices based on open platforms. However, on open platforms users can run exploits, rec...
Ahmad-Reza Sadeghi, Marko Wolf, Christian Stü...