2020
DOI: 10.1002/dac.4388
|View full text |Cite
|
Sign up to set email alerts
|

Authenticated content distribution framework for digital rights management systems with smart card revocation

Abstract: The growing features of multimedia distribution across multiple smart devices have attained significant attention of many industries and users. In this context, digital rights management (DRM) is the system, which tries to ensure authorized content distribution. For much diverse and productive research in content distribution, DRM is paying attention to provide a better DRM protocol according to current requirements. But the violation of copyright protection of digital content (video, audio, and secret documen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 31 publications
(52 reference statements)
0
1
0
Order By: Relevance
“…In 1993, Bellare and Rogaway formalized the ROM model [12], which greatly improved the effectiveness of the algorithm, and made significant progress in the field of provable security in practical applications. Subsequently, a series of documents based on the security proof of the random oracle model were proposed [13][14][15][16]. However, since the model is based on a completely random oracle and it is an ideal security model, there are still many disputes about this model [17].…”
Section: Introductionsmentioning
confidence: 99%
“…In 1993, Bellare and Rogaway formalized the ROM model [12], which greatly improved the effectiveness of the algorithm, and made significant progress in the field of provable security in practical applications. Subsequently, a series of documents based on the security proof of the random oracle model were proposed [13][14][15][16]. However, since the model is based on a completely random oracle and it is an ideal security model, there are still many disputes about this model [17].…”
Section: Introductionsmentioning
confidence: 99%