{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:19:09Z","timestamp":1750306749482,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,10,1]],"date-time":"2013-10-01T00:00:00Z","timestamp":1380585600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003621","name":"Ministry of Science, ICT and Future Planning","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003621","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1145\/2513228.2513270","type":"proceedings-article","created":{"date-parts":[[2013,11,15]],"date-time":"2013-11-15T19:22:39Z","timestamp":1384543359000},"page":"306-311","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["An efficient protection scheme of digital contents under mobile devices"],"prefix":"10.1145","author":[{"given":"Youn-Sik","family":"Jeong","sequence":"first","affiliation":[{"name":"Dankook University, Yongin, Korea"}]},{"given":"Seong-Je","family":"Cho","sequence":"additional","affiliation":[{"name":"Dankook University, Yongin, Korea"}]},{"given":"Moonju","family":"Park","sequence":"additional","affiliation":[{"name":"Incheon National University Incheon, Korea"}]},{"given":"Jeonguk","family":"Ko","sequence":"additional","affiliation":[{"name":"Dankook University Yongin, Korea"}]},{"given":"Hyungjoon","family":"Shim","sequence":"additional","affiliation":[{"name":"Dankook University Yongin, Korea"}]},{"given":"Joonmo","family":"Kim","sequence":"additional","affiliation":[{"name":"Dankook University Gyeonggi, Korea"}]},{"given":"Sangchul","family":"Han","sequence":"additional","affiliation":[{"name":"Konkuk University Chungbuk, Korea"}]},{"given":"Minkyu","family":"Park","sequence":"additional","affiliation":[{"name":"Konkuk University Chungbuk, Korea"}]}],"member":"320","published-online":{"date-parts":[[2013,10]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"European Consumer Survey","author":"Dufft N.","year":"2005","unstructured":"N. Dufft , A. Stiehler , D. Vogeley , and T. Wichmann , \" Digital Music Usage and DRM \", European Consumer Survey , 2005 . N. Dufft, A. Stiehler, D. Vogeley, and T. Wichmann, \"Digital Music Usage and DRM\", European Consumer Survey, 2005."},{"key":"e_1_3_2_1_2_1","first-page":"1119","volume-title":"Proc. Of IEEE CCNC 2006 Workshop on Digital Rights Management Impact on Consumer Communications","volume":"2","author":"Su C. C.","year":"2006","unstructured":"Chu, C. C. Su , X. Prabhu , B. S. Gadh , R. Kurup , S. Sridhar , G. Sridhar , V., \"Mobile DRM for Multi-media Content Commerce in P2 P Networks ,\" Proc. Of IEEE CCNC 2006 Workshop on Digital Rights Management Impact on Consumer Communications , Vol. 2 , pp. 1119 -- 1123 , Jan. 2006 . Chu, C. C. Su, X. Prabhu, B. S. Gadh, R. Kurup, S. Sridhar, G. Sridhar, V., \"Mobile DRM for Multi-media Content Commerce in P2P Networks,\" Proc. Of IEEE CCNC 2006 Workshop on Digital Rights Management Impact on Consumer Communications, Vol. 2, pp. 1119--1123, Jan. 2006."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/AXMEDIS.2005.39"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015047.1015049"},{"key":"e_1_3_2_1_5_1","volume-title":"Cryptography: Theory and practice","author":"Stinson D. R.","year":"1995","unstructured":"D. R. Stinson , Cryptography: Theory and practice , CRC Press , 1995 D. R. Stinson, Cryptography: Theory and practice, CRC Press, 1995"},{"key":"e_1_3_2_1_6_1","first-page":"5219","volume-title":"Analysis of tradeoffs between security strength and energy savings in security protocols for WLANs,\" In Proceedings of Vehicular Technology Conference","author":"Prasithsangaree P.","year":"2004","unstructured":"P. Prasithsangaree and P. Krishnamurthy , \" Analysis of tradeoffs between security strength and energy savings in security protocols for WLANs,\" In Proceedings of Vehicular Technology Conference , pp. 5219 -- 5223 , Sep. 2004 . P. Prasithsangaree and P. Krishnamurthy, \"Analysis of tradeoffs between security strength and energy savings in security protocols for WLANs,\" In Proceedings of Vehicular Technology Conference, pp. 5219--5223, Sep. 2004."},{"key":"e_1_3_2_1_7_1","unstructured":"http:\/\/en.wikipedia.org\/wiki\/Feistel_cipher.  http:\/\/en.wikipedia.org\/wiki\/Feistel_cipher."},{"key":"e_1_3_2_1_8_1","first-page":"1445","author":"Prasithsangaree P.","year":"2003","unstructured":"P. Prasithsangaree and P. Krishnamurthy , \"Analysis of Energy Consumption of RC4 and AES Algorithms in Wireless LANs,\" In Proceedings of Global Telecommunications Conference , pp. 1445 -- 1449 , Dec. 2003 . P. Prasithsangaree and P. Krishnamurthy, \"Analysis of Energy Consumption of RC4 and AES Algorithms in Wireless LANs,\" In Proceedings of Global Telecommunications Conference, pp. 1445--1449, Dec. 2003.","journal-title":"\"Analysis of Energy Consumption of RC4 and AES Algorithms in Wireless LANs,\" In Proceedings of Global Telecommunications Conference"},{"key":"e_1_3_2_1_9_1","first-page":"183","author":"Chen H.","year":"2003","unstructured":"H. Chen , T. Finin , A. Joshi , \"An Intelligent Broker for context-Aware Systems,\" In Adjunct Proceedings of Ubicomp 2003 , pp. 183 -- 184 , Oct. 2003. H. Chen, T. Finin, A. Joshi, \"An Intelligent Broker for context-Aware Systems,\" In Adjunct Proceedings of Ubicomp 2003, pp. 183--184, Oct. 2003.","journal-title":"Adjunct Proceedings of Ubicomp"}],"event":{"name":"RACS'13: Research in Adaptive and Convergent Systems","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing","ACCT Association of Convergent Computing Technology"],"location":"Montreal Quebec Canada","acronym":"RACS'13"},"container-title":["Proceedings of the 2013 Research in Adaptive and Convergent Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2513228.2513270","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2513228.2513270","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:28:26Z","timestamp":1750231706000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2513228.2513270"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":9,"alternative-id":["10.1145\/2513228.2513270","10.1145\/2513228"],"URL":"https:\/\/doi.org\/10.1145\/2513228.2513270","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]},"assertion":[{"value":"2013-10-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}