2013
DOI: 10.1049/iet-ifs.2012.0191
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced digital rights management authentication scheme based on smart card

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
19
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(19 citation statements)
references
References 13 publications
0
19
0
Order By: Relevance
“…In this section, we evaluate the performance and security of the improved scheme via comparison with Zhang et al's scheme [39] and Yang et al's scheme [36]. For convenience, we enlist the necessary notations for the different operations used in these schemes in Table 2.…”
Section: Performance and Security Comparison Of The Improved Schemementioning
confidence: 99%
See 2 more Smart Citations
“…In this section, we evaluate the performance and security of the improved scheme via comparison with Zhang et al's scheme [39] and Yang et al's scheme [36]. For convenience, we enlist the necessary notations for the different operations used in these schemes in Table 2.…”
Section: Performance and Security Comparison Of The Improved Schemementioning
confidence: 99%
“…Since our scheme is an improvement of Yang et al's, we first analyze its efficiency as compared to scheme [36]. Our scheme uses two extra one-way hash operations during registration phase and two extra hash operations during authentication phase at the user side to provide efficient authentication and password update phase as displayed by Tables 4 and 5.…”
Section: Performance and Security Comparison Of The Improved Schemementioning
confidence: 99%
See 1 more Smart Citation
“…The DRM system manages the procedure of the digital contents including protection, distribution, and authorization. Using DRM technology, intellectual property is respected and protected by data encryption, so it can only be accessed by authorised users without limitless distribution [10,11].…”
Section: Introductionmentioning
confidence: 99%
“…In 2009, the first three-role based DRM implementation scenario authentication scheme using smart card was proposed by Zhang et al [12]. Then, Yang et al showed that Zhang et al 's scheme was vulnerable to the insider attack and the stolen smart card attack [10]. Due to surmounting the weaknesses of Zhang 's scheme and found that their scheme cannot resist the password guessing attack and the denial of service attack.…”
Section: Introductionmentioning
confidence: 99%