{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T04:15:41Z","timestamp":1746159341534,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642545245"},{"type":"electronic","value":"9783642545252"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54525-2_16","type":"book-chapter","created":{"date-parts":[[2014,2,7]],"date-time":"2014-02-07T14:26:22Z","timestamp":1391783182000},"page":"184-191","source":"Crossref","is-referenced-by-count":0,"title":["Cryptanalysis of Two Authentication Scheme for DRM System"],"prefix":"10.1007","author":[{"given":"Dheerendra","family":"Mishra","sequence":"first","affiliation":[]},{"given":"Sourav","family":"Mukhopadhyay","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Ku, W., Chi, C.: Survey on the technological aspects of digital rights management. Information Security, 391\u2013403 (2004)","DOI":"10.1007\/978-3-540-30144-8_33"},{"key":"16_CR2","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/978-3-642-22726-4_24","volume-title":"Advances in Computing and Communications","author":"R. Dutta","year":"2011","unstructured":"Dutta, R., Mishra, D., Mukhopadhyay, S.: Vector space access structure and ID based distributed DRM key management. In: Abraham, A., Mauri, J.L., Buford, J.F., Suzuki, J., Thampi, S.M. (eds.) ACC 2011, Part IV. CCIS, vol.\u00a0193, pp. 223\u2013232. Springer, Heidelberg (2011)"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Liu, Q., Safavi-Naini, R., Sheppard, N.P.: Digital rights management for content distribution. In: Proceedings of the Australasian Information Security Workshop Conference on ACSW Frontiers 2003, vol.\u00a021, pp. 49\u201358. Australian Computer Society, Inc. (2003)","DOI":"10.1007\/3-540-45067-X"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Michiels, S., Verslype, K., Joosen, W., De Decker, B.: Towards a software architecture for DRM. In: Proceedings of the 5th ACM Workshop on Digital Rights Management, pp. 65\u201374. ACM (2005)","DOI":"10.1145\/1102546.1102559"},{"key":"16_CR5","series-title":"LNICST","doi-asserted-by":"publisher","first-page":"568","DOI":"10.1007\/978-3-642-37949-9_50","volume-title":"Quality, Reliability, Security and Robustness in Heterogeneous Networks","author":"D. Mishra","year":"2013","unstructured":"Mishra, D., Mukhopadhyay, S.: A certificateless authenticated key agreement protocol for digital rights management system. In: Singh, K., Awasthi, A.K. (eds.) QShine 2013. LNICST, vol.\u00a0115, pp. 568\u2013577. Springer, Heidelberg (2013)"},{"key":"16_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/978-3-642-38033-4_23","volume-title":"Information Security Practice and Experience","author":"D. Mishra","year":"2013","unstructured":"Mishra, D., Mukhopadhyay, S.: Secure content delivery in DRM system with consumer privacy. In: Deng, R.H., Feng, T. (eds.) ISPEC 2013. LNCS, vol.\u00a07863, pp. 321\u2013335. Springer, Heidelberg (2013)"},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Nair, S.K., Popescu, B.C., Gamage, C., Crispo, B., Tanenbaum, A.S.: Enabling drm-preserving digital content redistribution. In: Seventh IEEE International Conference on E-Commerce Technology, CEC 2005, pp. 151\u2013158. IEEE (2005)","DOI":"10.1109\/ICECT.2005.43"},{"key":"16_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/11824633_17","volume-title":"Trust and Privacy in Digital Business","author":"J. N\u00fctzel","year":"2006","unstructured":"N\u00fctzel, J., Beyer, A.: Towards trust in digital rights management systems. In: Fischer-H\u00fcbner, S., Furnell, S., Lambrinoudakis, C. (eds.) TrustBus 2006. LNCS, vol.\u00a04083, pp. 162\u2013171. Springer, Heidelberg (2006)"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Sun, H.M., Hung, C.F., Chen, C.M.: An improved digital rights management system based on smart cards. In: Digital EcoSystems and Technologies Conference, DEST 2007, pp. 308\u2013313. Inaugural IEEE-IES, IEEE (2007)","DOI":"10.1109\/DEST.2007.371989"},{"issue":"1","key":"16_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jksuci.2012.05.002","volume":"25","author":"H. Fourar-Laidi","year":"2013","unstructured":"Fourar-Laidi, H.: A smart card based framework for securing e-business transactions in distributed systems. Journal of King Saud University-Computer and Information Sciences\u00a025(1), 1\u20135 (2013)","journal-title":"Journal of King Saud University-Computer and Information Sciences"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Wang, D., Li, J., Memik, G.: Authentication scheme of DRM system for remote users based on multimodal biometrics, watermarking and smart cards. In: WRI Global Congress on Intelligent Systems, GCIS, vol. 2., 530\u2013534. IEEE (2009)","DOI":"10.1109\/GCIS.2009.196"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Lee, N.Y., Lee, T.Y.: User friendly digital rights management system based on smart cards. In: Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2009, pp. 869\u2013872. IEEE (2009)","DOI":"10.1109\/IIH-MSP.2009.130"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Jeong, E.S., Sur, C., Rhee, K.H.: A new DRM system based on graded contents sharing and time-block distribution for home networks. In: 6th IEEE\/ACIS International Conference on Computer and Information Science, ICIS 2007, pp. 830\u2013833. IEEE (2007)","DOI":"10.1109\/ICIS.2007.36"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Fan, K., Pei, Q., Mo, W., Zhao, X., Li, X.: A novel authentication mechanism for improving the creditability of drm system. In: International Conference on Communication Technology, ICCT 2006, pp. 1\u20134. IEEE (2006)","DOI":"10.1109\/ICCT.2006.341834"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Malladi, S., Heckendorn, A.F.J.,, R.B.: On preventing replay attacks on security protocols. Technical report, DTIC Document (2002)","DOI":"10.21236\/ADA462295"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Aura, T.: Strategies against replay attacks. In: Proceedings of 10th Computer Security Foundations Workshop, pp. 59\u201368 (1997)","DOI":"10.1109\/CSFW.1997.596787"},{"key":"16_CR17","first-page":"1311","volume":"arXiv","author":"D. Mishra","year":"2013","unstructured":"Mishra, D.: A study on id-based authentication schemes for telecare medical information system. arXiv preprint arXiv:1311.0151 (2013)","journal-title":"arXiv preprint"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54525-2_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T20:17:47Z","timestamp":1746130667000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-54525-2_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642545245","9783642545252"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54525-2_16","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}