2014
DOI: 10.1007/s11042-014-2135-7
|View full text |Cite
|
Sign up to set email alerts
|

A novel approach to rights sharing-enabling digital rights management for mobile multimedia

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2016
2016
2018
2018

Publication Types

Select...
8

Relationship

2
6

Authors

Journals

citations
Cited by 20 publications
(4 citation statements)
references
References 19 publications
0
4
0
Order By: Relevance
“…Secure connections are also essential to avoid DRM license violation. For example, digital right licenses could be linked to hardware profiles for sharing among devices (as illustrated by Zhang et al, 2014) or for controlling the display of protected content as shown by Wang et al (2013). Without such mechanism in place, legitimate users can listen to an insecure connection and overwrite a unique serial number of the device, resulting in protected content delivered to unauthorised devices.…”
Section: Discussionmentioning
confidence: 99%
“…Secure connections are also essential to avoid DRM license violation. For example, digital right licenses could be linked to hardware profiles for sharing among devices (as illustrated by Zhang et al, 2014) or for controlling the display of protected content as shown by Wang et al (2013). Without such mechanism in place, legitimate users can listen to an insecure connection and overwrite a unique serial number of the device, resulting in protected content delivered to unauthorised devices.…”
Section: Discussionmentioning
confidence: 99%
“…pay influential users to advertise a particular product, in order to maximize exposure). Some studies on social network trust model and credential paths finding algorithms were done [24][25][26]. In this special issue, Zhuang et al [27] presented a way of measuring the spread influence of users in microblog.…”
Section: Social Networkmentioning
confidence: 99%
“…3 The spammers spread malicious links and annoying messages to OSN users without target, and privacy information is unsafe for the cheating actions 4 and blackmails. 5 To prevent the malicious activities, many schemes such as Access Control 6 and digital rights protection [7][8][9] are proposed. In these schemes, trust degree is usually viewed as the main criterion for security policies to make the privacy management more feasible and effective.…”
Section: Introductionmentioning
confidence: 99%