{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T09:42:47Z","timestamp":1725702167792},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642341342"},{"type":"electronic","value":"9783642341359"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34135-9_31","type":"book-chapter","created":{"date-parts":[[2012,9,10]],"date-time":"2012-09-10T12:08:15Z","timestamp":1347278895000},"page":"304-313","source":"Crossref","is-referenced-by-count":2,"title":["Towards a Secure, Transparent and Privacy-Preserving DRM System"],"prefix":"10.1007","author":[{"given":"Dheerendra","family":"Mishra","sequence":"first","affiliation":[]},{"given":"Sourav","family":"Mukhopadhyay","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"31_CR1","unstructured":"Blaklly, G.R.: Safeguarding cryptographic keys. In: Proceedings of the National Computer Conference, vol.\u00a048, pp. 313\u2013317 (1979)"},{"key":"31_CR2","doi-asserted-by":"crossref","unstructured":"Dutta, R., Mukhopadhyay, S., Dowling, T.: Key management in multi-distributor based DRM system with mobile clients using IBE. In: Second International Conference on the Applications of Digital Information and Web Technologies, ICADIWT 2009, pp. 597\u2013602 (2009)","DOI":"10.1109\/ICADIWT.2009.5273858"},{"key":"31_CR3","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/978-3-642-22726-4_24","volume-title":"Advances in Computing and Communications","author":"R. Dutta","year":"2011","unstructured":"Dutta, R., Mishra, D., Mukhopadhyay, S.: Vector Space Access Structure and ID Based Distributed DRM Key Management. In: Abraham, A., Mauri, J.L., Buford, J.F., Suzuki, J., Thampi, S.M. (eds.) ACC 2011, Part IV. CCIS, vol.\u00a0193, pp. 223\u2013232. Springer, Heidelberg (2011)"},{"key":"31_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/978-3-642-24586-2_7","volume-title":"Security Aspects in Information Technology","author":"R. Dutta","year":"2011","unstructured":"Dutta, R., Mishra, D., Mukhopadhyay, S.: Access Policy Based Key Management in Multi-level Multi-distributor DRM Architecture. In: Joye, M., Mukhopadhyay, D., Tunstall, M. (eds.) InfoSecHiComNet 2011. LNCS, vol.\u00a07011, pp. 57\u201371. Springer, Heidelberg (2011)"},{"key":"31_CR5","doi-asserted-by":"crossref","unstructured":"Mishra, D., Mukhopadhyay, S.: Privacy rights management in multiparty multilevel DRM system. In: Proceedings of the International Conference on Advances in Computing, Communications and Informatics, pp. 625\u2013631 (2012)","DOI":"10.1145\/2345396.2345498"},{"key":"31_CR6","doi-asserted-by":"crossref","unstructured":"Feng, M., Zhu, B.: A DRM system protecting consumer privacy. In: 5th IEEE Consumer Communications and Networking Conference, CCNC 2008, pp. 1075\u20131079 (2008)","DOI":"10.1109\/ccnc08.2007.244"},{"issue":"3","key":"31_CR7","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1016\/j.jss.2003.10.016","volume":"73","author":"S.O. Hwang","year":"2004","unstructured":"Hwang, S.O., Yoon, K.S., Jun, K.P., Lee, K.H.: Modeling and implementation of digital rights. Journal of Systems and Software\u00a073(3), 533\u2013549 (2004)","journal-title":"Journal of Systems and Software"},{"key":"31_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"548","DOI":"10.1007\/11573036_52","volume-title":"Advances in Informatics","author":"S.K. Katsikas","year":"2005","unstructured":"Katsikas, S.K., Lopez, J., Pernul, G.: Trust, Privacy and Security in E-Business: Requirements and Solutions. In: Bozanis, P., Houstis, E.N. (eds.) PCI 2005. LNCS, vol.\u00a03746, pp. 548\u2013558. Springer, Heidelberg (2005)"},{"key":"31_CR9","doi-asserted-by":"crossref","unstructured":"Liu, Q., Safavi-Naini, R., Sheppard, N.P.: Digital Rights Management for Content Distribution. In: Proceedings of Australasian Information Security Workshop Conference on ACSW Frontiers, pp. 49\u201358 (2003)","DOI":"10.1145\/1029146.1029163"},{"key":"31_CR10","doi-asserted-by":"crossref","unstructured":"Rosset, V., Filippin, C.V., Westphall, C.M.: A DRM Architecture to Distribute and Protect Digital Content Using Digital Licenses. In: Telecommunications 2005, pp. 422\u2013427 (2005)","DOI":"10.1109\/AICT.2005.5"},{"key":"31_CR11","doi-asserted-by":"crossref","unstructured":"Sachan, A., Emmanuel, S.: DRM violation detection using consumer logs analysis. In: IEEE International Conference on Multimedia and Expo., ICME 2011, pp. 1\u20136 (2011)","DOI":"10.1109\/ICME.2011.6012158"},{"key":"31_CR12","doi-asserted-by":"crossref","unstructured":"Sachan, A., Emmanuel, S., Das, A., Kankanhalli, M.S.: Privacy Preserving Multiparty Multilevel DRM Architecture. In: IEEE Consumer Communications and Networking Conference, pp. 1\u20135 (2009)","DOI":"10.1109\/CCNC.2009.4784937"},{"issue":"11","key":"31_CR13","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to Share a Secret. Communications of the ACM\u00a022(11), 612\u2013613 (1979)","journal-title":"Communications of the ACM"},{"issue":"2","key":"31_CR14","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/MP.2006.1649008","volume":"25","author":"S.R. Subramanya","year":"2006","unstructured":"Subramanya, S.R., Yi, B.K.: Digital rights management. IEEE Potentials\u00a025(2), 31\u201334 (2006)","journal-title":"IEEE Potentials"},{"key":"31_CR15","doi-asserted-by":"crossref","unstructured":"Thomas, T., Emmanuel, S., Das, A., Kankanhalli, M.S.: Secure multimedia content delivery with multiparty multilevel DRM architecture. In: Proceedings of the 18th International Workshop on Network and Operating Systems Support for Digital Audio and Video, pp. 85\u201390. ACM (2009)","DOI":"10.1145\/1542245.1542265"},{"key":"31_CR16","doi-asserted-by":"crossref","unstructured":"Win, L.L., Thomas, T., Emmanuel, S.: A privacy preserving content distribution mechanism for DRM without trusted third parties. In: IEEE International Conference on Multimedia and Expo., ICME 2011, pp. 1\u20136 (2011)","DOI":"10.1109\/ICME.2011.6012033"},{"key":"31_CR17","doi-asserted-by":"crossref","unstructured":"Yao, J., Lee, S., Nam, S.: Privacy preserving DRM solution with content classification and superdistribution. In: Consumer Communications and Networking Conference, CCNC 2009, pp. 1\u20135 (2009)","DOI":"10.1109\/CCNC.2009.4784776"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34135-9_31.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,25]],"date-time":"2023-06-25T17:04:43Z","timestamp":1687712683000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34135-9_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642341342","9783642341359"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34135-9_31","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}