[1] Ma Guojun, Pei Qingqi, Jiang Xiaohong, et al. A Proxy Re-encryption Based Sharing Model for DRM [J]. International Journal of Digital Content Technology and its Applications, 2011, 5(11): 385-393.
[2] Zhang Zhiyong, Pei Qingqi, Yang Lin, et al. Game-Theoretic Analyses and Simulations of Adoptions of Security Policies for DRM in Contents Sharing Scenario [J]. Intelligent Automation and Soft Computing, 2011,17(2): 191-203.
[3] 冯雪, 俞银燕, 汤帜. 具有硬件适应性的多设备内容共享与版权保护方法 [J]. 北京大学学报, 2011, 47(6): 1009-1016.
Feng Xue, Yu Yinyan, Tang Zhi. Hardware Adaptive Copyright Protection Method for Multiple Devices of End-User[J]. Acta Scientiarum Naturalium Universitatis Pekinensis, 2011, 47(6): 1009-1016.
[4] Diaz-Sanchez D, Sanvido F, Proserpio D, et al. DLNA, DVB-CA and DVB-CPCM Integration for Commercial Content Management [J]. IEEE Transactions on Consumer Electronics, 2010, 56(1): 79-87.
[5] Koster P, Montaner J, Koraichi N, et al. Introduction of the Domain Issuer in OMA DRM [C]//Proceedings of Consumer Communications and Networking Conference. Piscataway: IEEE, 2007: 940-944.
[6] Abbadi I, Alawneh M. DRM Domain Authentication Using Electronic Payment Systems [C]//Proceedings of the 10th International Conference on Electronic Commerce. New York: ACM Press, 2008: 1-10.
[7] Popescu B C, Kamperman F L A J, Crispo B, et al. A DRM Security Architecture for Home Networks [C]//Proceedings of the 4th ACM Workshop on Digital Rights Management. New York: ACM Press, 2004: 1-10.
[8] Koster P, Kamperman F, Lenoir P, et al. Identity Base DRM: Personal Entertainment Domain [C]//Lecture Notes in Computer Science: Data Hiding and Multimedia Security Ⅰ: 4300. Heidelberg: Springer Verlag, 2006, 104-122.
[9] Sahai A, Waters B. Fuzzy Identity-based Encryption [C]//Advances in Cryptology-EUROCRYPT. Heidelberg: Springer Verlag, 2005: 457-473.
[10] Goyal V, Pandey O, Sahai A, et al. Attribute-Based Encryption for Fine-grained Access Control of Encrypted Data [C]//Proceedings of the 13th ACM Conference on Computer and Communications Security. New York: ACM Press, 2006: 89-98.
[11] Bethencourt J, Sahai A, Waters B. Ciphertext-Policy Attribute-based Encryption [C]//Proceedings of the IEEE Sympium on Security and Privacy. Piscataway: IEEE Computer Society, 2007: 321-334. |