2014
DOI: 10.4028/www.scientific.net/amm.631-632.952
|View full text |Cite
|
Sign up to set email alerts
|

Right Transfer Method Based on Double HASH Chain

Abstract: This Paper analyzes security issues during the process of the right transfer, sums up the basic needs during the transfer and the defects of existing rights transfer, and puts forward the right transfer program based on double HASH chain, which achieves the transfer of the digital right under the control of HASH Distance and meta-rights. Security analysis shows that the authentication, integrity, confidentiality, and impartiality of the program are well guaranteed.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 11 publications
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?