{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,23]],"date-time":"2025-01-23T05:36:30Z","timestamp":1737610590598,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540772545"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-77255-2_26","type":"book-chapter","created":{"date-parts":[[2007,12,1]],"date-time":"2007-12-01T03:10:54Z","timestamp":1196478654000},"page":"236-245","source":"Crossref","is-referenced-by-count":11,"title":["Implementing DRM over Peer-to-Peer Networks with Broadcast Encryption"],"prefix":"10.1007","author":[{"given":"Yao","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Chun","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Yuzhuo","family":"Zhong","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"26_CR1","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/MP.2006.1649008","volume":"25","author":"S.R. Subramanya","year":"2006","unstructured":"Subramanya, S.R., Yi, B.K.: Digital Rights Management. IEEE Potentials\u00a025(2), 31\u201334 (2006)","journal-title":"IEEE Potentials"},{"key":"26_CR2","doi-asserted-by":"crossref","unstructured":"Kumar, V.: Trust and Security in Peer-to-Peer System. In: Proceedings of the 17th Inter-national Conference on Database and Expert Systems Applications, pp. 703\u2013707 (2006)","DOI":"10.1109\/DEXA.2006.142"},{"key":"26_CR3","doi-asserted-by":"crossref","unstructured":"Yu, F., Zhang, H., Yan, F.: A Fuzzy Relation Trust Model in P2P System. In: International Conference on Computation Intelligence and Security, vol.\u00a02, pp. 1497\u20131502 (2006)","DOI":"10.1109\/ICCIAS.2006.295309"},{"key":"26_CR4","doi-asserted-by":"crossref","unstructured":"Griffiths, N., Chao, K.-M., Younas, M.: Fuzzy Trust for Peer-to-Peer Systems. In: Proceedings of the 26th IEEE International Conference on Distributed Computing Systems Workshops, pp. 73\u201378 (2006)","DOI":"10.1109\/ICDCSW.2006.57"},{"issue":"6","key":"26_CR5","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MIC.2005.136","volume":"9","author":"S. Song","year":"2005","unstructured":"Song, S., Hwang, K., Zhou, R., Kwok, Y.-K.: Trusted P2P Transactions with Fuzzy Reputation Aggregation. IEEE Internet Computing\u00a09(6), 24\u201334 (2005)","journal-title":"IEEE Internet Computing"},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Singh, A., Liu, L.: TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems. In: Proceedings of the Third International Conference on Peer-to-Peer Computing, pp. 142\u2013149 (2003)","DOI":"10.1109\/PTP.2003.1231514"},{"issue":"9","key":"26_CR7","doi-asserted-by":"publisher","first-page":"829","DOI":"10.1109\/TPDS.2003.1233706","volume":"14","author":"L. Xiao","year":"2003","unstructured":"Xiao, L., Xu, Z., Zhang, X.: Low-Cost and Reliable Mutual Anonymity Protocols in Peer-to-Peer Networks. IEEE Transactions on Parallel and Distributed Systems\u00a014(9), 829\u2013840 (2003)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"26_CR8","unstructured":"Nandan, A., Pau, G., Salomoni, P.: GhostShare \u2013 Reliable and Anonymous P2P Video Distribution. In: IEEE Global Telecommunications Conference Workshops, pp. 200\u2013210 (2004)"},{"key":"26_CR9","doi-asserted-by":"crossref","unstructured":"Mee, J., Watters, P.A.: Detecting and Tracing Copyright Infringements in P2P Net-works. In: Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, pp. 60\u201365 (2006)","DOI":"10.1109\/ICNICONSMCL.2006.77"},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"Chen, K., Deng, Q.: Legitimate Peer-to-Peer Content Distribution Network. In: Proceedings of the Fifth International Conference on Grid and Cooperative Computing Workshops (2006)","DOI":"10.1109\/GCCW.2006.60"},{"key":"26_CR11","doi-asserted-by":"crossref","unstructured":"Schmucker, M., Ebinger, P.: Promotional and Commercial Content Distribution based on a Legal and Trusted P2P Framework. In: Proceedings of the Seventh IEEE International Conference on E-Commerce Technology, pp. 439\u2013442 (2005)","DOI":"10.1109\/ICECT.2005.71"},{"key":"26_CR12","doi-asserted-by":"crossref","unstructured":"Chu, C.-C., Su, X., Prabhu, B.S., Gadh, R., Kurup, S., Sridhar, G., Sridhar, V.: Mobile DRM for Multimedia Content Commerce in P2P Networks. In: 2006 3rd IEEE Consumer Communi-cations and Networking Conference, vol.\u00a02, pp. 1119\u20131123 (January 2006)","DOI":"10.1109\/CCNC.2006.1593212"},{"key":"26_CR13","doi-asserted-by":"crossref","unstructured":"Neelima Arora, R.K., Shyamasundar, R.K.: PGSP: A Protocol for Secure Communication in Peer-to-Peer System. In: IEEE Wireless Communications and Networking Conference, vol.\u00a04, pp. 2094\u20132099 (2005)","DOI":"10.1109\/WCNC.2005.1424841"},{"issue":"4","key":"26_CR14","first-page":"579","volume":"50","author":"V. Pathak","year":"2006","unstructured":"Pathak, V., Iftode, L.: Byzantine Fault Tolerant Public Key Authentication in Peer-to-Peer Systems. Computer Networks. Special Issues on Management in Peer-to-Peer Systems: Trust, Reputation and Security\u00a050(4), 579\u2013596 (2006)","journal-title":"Computer Networks. Special Issues on Management in Peer-to-Peer Systems: Trust, Reputation and Security"},{"key":"26_CR15","doi-asserted-by":"crossref","unstructured":"Palomar, E., Estevez-Tapiador, J.M., Hernandez-Castro, J.C., Ribagorda, A.: Certificate-based Access Control in Pure P2P Networks. In: Proceedings of the Sixth IEEE International Conference on Peer-to-Peer Computing, pp. 177\u2013184 (2006)","DOI":"10.1109\/P2P.2006.7"},{"issue":"2","key":"26_CR16","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1109\/MSP.2004.1276115","volume":"21","author":"F. Pestoni","year":"2004","unstructured":"Pestoni, F., Lotspiech, J.B., Nusser, S.: xCP: Peer-to-Peer Content Protection. IEEE Signal Processing Magazine\u00a021(2), 71\u201381 (2004)","journal-title":"IEEE Signal Processing Magazine"},{"key":"26_CR17","doi-asserted-by":"crossref","unstructured":"Zhou, Y.C., Cerruti, J.A., Ma, L., Ma, L., Myles, G.: CPWCT: Making P2P Home Network Secure Virtual Multimedia Device. In: Proceedings of the IEEE Conference on Local Computer Networks 30th Anniversary (2005)","DOI":"10.1109\/LCN.2005.42"},{"key":"26_CR18","doi-asserted-by":"crossref","unstructured":"Fiat, A., Naor, M.: Broadcast Encryption. In: Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology, pp. 480\u2013491 (August 1994)","DOI":"10.1007\/3-540-48329-2_40"},{"issue":"8","key":"26_CR19","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1109\/MC.2002.1023789","volume":"35","author":"J. Lotspiech","year":"2002","unstructured":"Lotspiech, J., Nusser, S., Pestoni, F.: Broadcast Encryption\u2019s Bright Future. Computer\u00a035(8), 57\u201363 (2002)","journal-title":"Computer"},{"key":"26_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1007\/11535218_16","volume-title":"CRYPTO 2005","author":"D. Boneh","year":"2005","unstructured":"Boneh, D., Gentry, C., Waters, B.: Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.\u00a03621, pp. 258\u2013275. Springer, Heidelberg (2005)"}],"container-title":["Lecture Notes in Computer Science","Advances in Multimedia Information Processing \u2013 PCM 2007"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77255-2_26.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,23]],"date-time":"2025-01-23T02:40:06Z","timestamp":1737600006000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77255-2_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540772545"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77255-2_26","relation":{},"subject":[]}}