{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T14:28:10Z","timestamp":1744900090880,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,7]]},"DOI":"10.1109\/coginf.2010.5599791","type":"proceedings-article","created":{"date-parts":[[2010,10,12]],"date-time":"2010-10-12T11:44:17Z","timestamp":1286883857000},"page":"859-862","source":"Crossref","is-referenced-by-count":3,"title":["A DRM model based on proactive secret sharing scheme for P2P networks"],"prefix":"10.1109","author":[{"given":"Ling","family":"Ma","sequence":"first","affiliation":[]},{"given":"Shouxun","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yongbin","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Middleware - based DRM Model in P2P Frameworks[J]","volume":"29","author":"tian","year":"2007","journal-title":"Journal of Wuhan University of Technology(Information & Management Engineering)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46416-6_20"},{"year":"0","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"key":"ref14","first-page":"417","article-title":"Uses of Elliptic Curves in Crytography[A]","volume":"186","author":"miller","year":"0","journal-title":"Advances in Cryptology -CRYPTO LNCS"},{"journal-title":"Certicom's Crypto Reeearch ECC Online Tutorial White Papers [OB\/OL]","year":"0","key":"ref15"},{"key":"ref16","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-03642-6","article-title":"Algebraic Aspects of Cryptography [A]","author":"koblitz","year":"1998","journal-title":"Algorithms and Computation in Mathematics"},{"key":"ref17","first-page":"57","article-title":"Scheme and Realization of Prior Secret-Share[J]","volume":"27","author":"zhou","year":"2005","journal-title":"Information Command Control System and Simulation Technology"},{"key":"ref18","first-page":"399","article-title":"Proactive Secret Sharing in Asynchronous Networks with Unreliable Links[J]","volume":"32","author":"guo","year":"2004","journal-title":"Acta Electronica Sinica"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICACT.2006.206014"},{"journal-title":"The Benefits and Challenges of Providing Content Protection in Peer-to-Peer Systems","year":"0","author":"judge","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/BF02829269"},{"journal-title":"A DRM Architecture for Manageable P2P based IPTV System 1&#x2013;4244&#x2013;1017&#x2013;7\/07 2007 IEEE ICME","year":"2007","author":"liu","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77255-2_26"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/APCC.2003.1274471"},{"journal-title":"P2P Structure Application and Design (In china)","year":"0","author":"chen","key":"ref1"},{"journal-title":"Gadh Mobile DRM for Multimedia Content Commerce in P2P Networks 1&#x2013;4244&#x2013;0086&#x2013;4\/05?2005 IEEE","year":"0","author":"chu","key":"ref9"}],"event":{"name":"2010 9th IEEE International Conference on Cognitive Informatics (ICCI)","start":{"date-parts":[[2010,7,7]]},"location":"Beijing, China","end":{"date-parts":[[2010,7,9]]}},"container-title":["9th IEEE International Conference on Cognitive Informatics (ICCI'10)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5560187\/5599672\/05599791.pdf?arnumber=5599791","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,5]],"date-time":"2019-06-05T07:59:50Z","timestamp":1559721590000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5599791\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,7]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/coginf.2010.5599791","relation":{},"subject":[],"published":{"date-parts":[[2010,7]]}}}