Sciweavers

24 search results - page 3 / 5
» Hash-based Counter Scheme for Digital Rights Management
Sort
View
SASN
2004
ACM
13 years 11 months ago
Location-aware key management scheme for wireless sensor networks
Sensor networks are composed of a large number of low power sensor devices. For secure communication among sensors, secret keys must be established between them. Recently, several...
Dijiang Huang, Manish Mehta 0003, Deep Medhi, Lein...
CISC
2007
Springer
98views Cryptology» more  CISC 2007»
13 years 12 months ago
Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM
Abstract. The Trusted Computing Group (TCG) defines the specifications for the Trusted Platform Module (TPM) and corresponding trust mechanisms that allow a TPM-enabled platform ...
Yongdong Wu, Feng Bao, Robert H. Deng, Marc Mouffr...
WISA
2004
Springer
13 years 11 months ago
License Protection with a Tamper-Resistant Token
Content protection mechanisms are intended to enforce the usage rights on the content. These usage rights are carried by a license. Sometimes, a license even carries the key that i...
Cheun Ngen Chong, Bin Ren, Jeroen Doumen, Sandro E...
ICMCS
2007
IEEE
170views Multimedia» more  ICMCS 2007»
14 years 2 days ago
A DRM Architecture for Manageable P2P Based IPTV System
With the improvement of network bandwidth, multimedia services based on streaming live media have gained much attention recently, among which IPTV has become a hot topic. After em...
Xiaoyun Liu, Tiejun Huang, Longshe Huo, Luntian Mo...
ISMIR
2005
Springer
172views Music» more  ISMIR 2005»
13 years 11 months ago
Preservation Digitization of David Edelberg's Handel LP Collection: A Pilot Project
Although analogue phonograph recordings (LPs) have long shelf lives, there are many reasons for initiating research into proper procedures for their digital preservation. In order...
Catherine Lai, Beinan Li, Ichiro Fujinaga