{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T05:05:30Z","timestamp":1737435930003,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540735465"},{"type":"electronic","value":"9783540735472"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-73547-2_16","type":"book-chapter","created":{"date-parts":[[2007,8,11]],"date-time":"2007-08-11T14:54:52Z","timestamp":1186844092000},"page":"135-145","source":"Crossref","is-referenced-by-count":0,"title":["An Efficient and Secure Rights Sharing Method for DRM System Against Replay Attack"],"prefix":"10.1007","author":[{"given":"Donghyun","family":"Choi","sequence":"first","affiliation":[]},{"given":"Yunho","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Hogab","family":"Kang","sequence":"additional","affiliation":[]},{"given":"Seungjoo","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Dongho","family":"Won","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","unstructured":"Ripley, M., Traw, C.B.S., Balogh, S., Reed, M.: Content Protection in the Digital Home. Intel Technology journal 49\u201356 (2002)"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Eskicioglu, A.M., Delp, E.J.: An overview of multimedia content protection in consumer electronic devices. Signal Processing: Image Communication 681\u2013699 (2001)","DOI":"10.1016\/S0923-5965(00)00050-3"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Eskicioglu, A.M., Town, J., Delp, E.J.: Security of Digital Entertainment Content from Creation to Consumption. Signal Processing: Image Communication 237\u2013262 (2003)","DOI":"10.1016\/S0923-5965(02)00143-1"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Liu, Q., Safavi-Naini, R., Sheppard, N.P.: Digital rights management for content distribution. In: proceedings of the Australasian information security workshop conference on AISW frontiers, pp. 49\u201358 (2003)","DOI":"10.1145\/1029146.1029163"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Michiels, S., Verslype, K., Joosen, W., Decker, B.: Towards a Software Architecture for DRM. In: Proceedings of the Fifth ACM Workshop on Digital Rights Management, pp. 65\u201374 (2005)","DOI":"10.1145\/1102546.1102559"},{"key":"16_CR6","unstructured":"van den Heuval, S., Jonker, W., Kamperman, F., Lenoir, P.: Secure Content Management in Authorized Domains. In: Proc. IBC, pp. 467\u2013474 (2002)"},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Sovio, S., Asokan, N., Nyberg, K.: Defining Authorization Domains Using Cirtual Devices. In: SAINT Workshops, pp. 331\u2013336 (2003)","DOI":"10.1109\/SAINTW.2003.1210181"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Tuecke, S., Welch, V., Engert, D., Pearlman, L., Thompson, M.: Internet X.509 Public Key Infrastructure (PKI) Proxy Certificate Profile. RFC 3820 (2004)","DOI":"10.17487\/rfc3820"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Popescu, Bogdan, C., Kamperman, Frank, L.A.J., Crispo, Bruno, Tanenbaum, Andrew, S.: A DRM security architecture for home networks. In: Proceedings of the 4th ACM workshop on Digital rights management, pp. 1\u201310 (2004)","DOI":"10.1145\/1029146.1029150"},{"key":"16_CR10","unstructured":"DVB: Call for proposals for content protection & copy management technologies. DVB CPT REV 1.2 (2001)"},{"key":"16_CR11","unstructured":"IBM Research Division Almadern Research Center: eXtensible Content Protection (2003)"},{"key":"16_CR12","unstructured":"THOMSON: Smartright technical white paper (2003), Available: http:\/\/www.smartright.org\/images\/SMR\/content\/SmartRight_tech_whitepaper_jan28.pdf"},{"key":"16_CR13","unstructured":"Fraunhofer Institute, Light Weight DRM (LWDRM), http:\/\/www.lwdrm.com"},{"key":"16_CR14","unstructured":"Wikipedia, http:\/\/en.wikipedia.org"},{"key":"16_CR15","unstructured":"Microsoft, http:\/\/www.Microsoft.com"}],"container-title":["Lecture Notes in Computer Science","Autonomic and Trusted Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-73547-2_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T08:27:27Z","timestamp":1737361647000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-73547-2_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540735465","9783540735472"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-73547-2_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}