2018
DOI: 10.1016/j.jisa.2018.02.001
|View full text |Cite
|
Sign up to set email alerts
|

An improved E-DRM scheme for mobile environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
18
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(18 citation statements)
references
References 20 publications
0
18
0
Order By: Relevance
“…To overcome the drawbacks reported above, a number of DRM systems implement protection schemes based on "trusted computing". They prevent the sharing of illegal keys and protected content by enabling the access to such content on the basis of the web users' biometric features [35,36]. In fact, such systems appear to be very promising, but they lack flexibility, since they need particular hardware, such as "trusted platform modules" (TPMs) or fingerprint recognizers, and cannot defend against specific attacks, such as screen recording or I/O monitoring.…”
Section: Related Workmentioning
confidence: 99%
“…To overcome the drawbacks reported above, a number of DRM systems implement protection schemes based on "trusted computing". They prevent the sharing of illegal keys and protected content by enabling the access to such content on the basis of the web users' biometric features [35,36]. In fact, such systems appear to be very promising, but they lack flexibility, since they need particular hardware, such as "trusted platform modules" (TPMs) or fingerprint recognizers, and cannot defend against specific attacks, such as screen recording or I/O monitoring.…”
Section: Related Workmentioning
confidence: 99%
“…To evaluate computation cost consumption of all existing scheme, we consider total performs an operation on user log‐in as well server side. Then compute scheme cost as sans-serifTsans-seriffe=1×0.0171, sans-serifTsans-serifh=17×0.00032 that conclude the final computation time of the respective scheme. Similarly, Odelu et al take 0.276 seconds, Doshi et al take 0.1298 seconds, Tsai and Lo take 0.8908 seconds, Mishra et al take 0.03214 seconds, Lee et al take 0.0236 seconds, Kumari and Khan take 0.1141 seconds, Xie et al take 0.1162 seconds, and Chen et al take 0.1967 seconds.…”
Section: Performance Analysismentioning
confidence: 99%
“…The time stamp and random nonce will be 32‐bit output . We consider the communication cost of authentication phases of our proposed scheme for comparing with existing other schemes, namely, Kumari and Khan, Xie et al, Mishra et al, Lee et al, Chen et al, and Lee et al We assume identities/random number/biometric takes 32 bits. We use 128‐bit AES for encryption plaintext.…”
Section: Performance Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Existing mainstream or novel DRM mechanisms include but are not limited to encapsulated encryption and confusion [2,3,4,5], digital watermarks [6,7,8,9,10,11,12,13,14], blockchain [15,16], trusted computing [17,18], biological features [19], etc. After reviewing the previous schemes, we believe that existing DRM technologies still have great defects.…”
Section: Introductionmentioning
confidence: 99%