Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleAugust 2022
Improved integral cryptanalysis of SPNbox in digital rights management systems
IET Information Security (ISE2), Volume 17, Issue 1Pages 147–158https://doi.org/10.1049/ise2.12087AbstractAs an access control technology of digital material, digital rights management systems have a profound effect on the copyright protection of digital content. To address the threat of key exposure, applying white‐box ciphers is effective to provide ...
- research-articleNovember 2021
Defining and Addressing the Cybersecurity Challenges of Additive Manufacturing Platforms
AMSec '21: Proceedings of the 2021 Workshop on Additive Manufacturing (3D Printing) SecurityPages 61–65https://doi.org/10.1145/3462223.3485622Additive Manufacturing (AM) Platform is a new technology and commercial business model which enables production of additively made parts through an on-line market of AM designs, services, and manufacturing. Customers who are designing parts to be ...
- research-articleSeptember 2021
Cryptanalysis of a white‐box SM4 implementation based on collision attack
IET Information Security (ISE2), Volume 16, Issue 1Pages 18–27https://doi.org/10.1049/ise2.12045AbstractWhite‐box cryptography is to primarily protect the key of a cipher from being extracted in a white‐box scenario, where an adversary has full access to the execution environment of software implementation. Since the introduction of white‐box ...
- invited-talkJune 2018
How Inadequate Specification, Buggy Implementation, and Deficient Platform-Support Hinder Security
SACMAT '18: Proceedings of the 23nd ACM on Symposium on Access Control Models and TechnologiesPage 221https://doi.org/10.1145/3205977.3206002Developing a secure system (or, protocol) in general boils down to having a correct and robust specification which developers faithfully implement with the available platform support. Vulnerabilities can thus crop up due to inadequate specification, ...
- keynoteMarch 2018
Code Obfuscation: Why is This Still a Thing?
CODASPY '18: Proceedings of the Eighth ACM Conference on Data and Application Security and PrivacyPages 173–174https://doi.org/10.1145/3176258.3176342Early developments in code obfuscation were chiefly motivated by the needs of Digital Rights Management (DRM). Other suggested applications included intellectual property protection of software and code diversification to combat the monoculture problem ...
-
- research-articleMarch 2018
Efficient identity‐based blind message recovery signature scheme from pairings
IET Information Security (ISE2), Volume 12, Issue 2Pages 150–156https://doi.org/10.1049/iet-ifs.2017.0342Blind signature (BS) schemes are a vital tool to design electronic cash (e‐cash), online transaction, electronic voting (e‐voting), digital right management (DRM) systems etc. The communication systems designed for such applications need small size and ...
- research-articleJanuary 2018
Distribute digital contents within digital images on the mobile
IC4E '18: Proceedings of the 9th International Conference on E-Education, E-Business, E-Management and E-LearningPages 35–39https://doi.org/10.1145/3183586.3183592Digital contents have been distributed through content platformers (Netflix, Amazon) and mobile OS (iOS, Android). Most of existing content distribution system pay less attention to the discussion on users' convenience and business models of content ...
- invited-talkOctober 2017
Privacy vs Multimedia Verification: A Conundrum
MuVer '17: Proceedings of the First International Workshop on Multimedia VerificationPages 31–32https://doi.org/10.1145/3132384.3132389This document summarizes the author's keynote at the 1st International Workshop on Multimedia Verification at the ACM Multimedia Conference, October 23 - 27, 2017 Mountain View, CA, USA.
- research-articleOctober 2015
Traitor Deterring Schemes: Using Bitcoin as Collateral for Digital Content
CCS '15: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications SecurityPages 231–242https://doi.org/10.1145/2810103.2813698We put forth a new cryptographic primitive called a Traitor Deterring Scheme (TDS). A TDS is a multi-recipient public-key encryption scheme where an authority issues decryption keys to a set of users. The distinguishing feature of a TDS is that secret-...
- articleSeptember 2014
Managing the data commons: Controlled sharing of scholarly data
Journal of the Association for Information Science and Technology (JAIST), Volume 65, Issue 9Pages 1757–1774This paper describes the range and variation in access and use control policies and tools used by 24 web-based data repositories across a variety of fields. It also describes the rationale provided by repositories for their decisions to control data or ...
- ArticleJuly 2014
Efficient and Enhanced Solutions for Content Sharing in DRM Systems
DBSec 2014: Proceedings of the 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy XXVIII - Volume 8566Pages 373–381https://doi.org/10.1007/978-3-662-43936-4_25We present a solution to the problem of content sharing in digital rights management DRM systems. Users in DRM systems purchase content from content providers and then wish to distribute it between their own devices or to other users. The goal is to ...
- research-articleJanuary 2014
A method of digital rights management based on Bitcoin protocol
ICUIMC '14: Proceedings of the 8th International Conference on Ubiquitous Information Management and CommunicationArticle No.: 84, Pages 1–6https://doi.org/10.1145/2557977.2558034In the digital world, so many copyrighted works are made in an illegal way because it is easy to keep and copy. Digital Rights Management has proposed to prevent this theft. Contents providers often bring in one server who has charge of managing the ...
- articleJanuary 2014
- articleNovember 2013
Internet and the Other IP
IEEE Internet Computing (IEEECS_INTERNET), Volume 17, Issue 6Page 96https://doi.org/10.1109/MIC.2013.112Copyrights have dominated the legal treatment of works of authors to the detriment of the theory of public domain treatment after a limited period of time. The imbalance should be addressed, as should the handling of rights in a digital regime where ...
- research-articleSeptember 2013
Enhanced digital rights management authentication scheme based on smart card
IET Information Security (ISE2), Volume 7, Issue 3Pages 189–194https://doi.org/10.1049/iet-ifs.2012.0191As a result of the explosive growth in development for computer networks and information technologies in recent years, various activities take place on the Internet, such as the multimedia services. Today, the distribution of large scale digital content (...
- research-articleAugust 2013
AtDRM: a DRM architecture with rights transfer and revocation capability
Compute '13: Proceedings of the 6th ACM India Computing ConventionArticle No.: 2, Pages 1–6https://doi.org/10.1145/2522548.2522599This work presents a new Digital Rights Management (DRM) architecture to address rights transfer and revocation aspects of protected content using a threshold Attribute-Based Encryption scheme. We considered two scenarios for rights transfer, here. In ...
- research-articleSeptember 2012
A legally-admissible copyrights ownership identification protocol for digital works
ICIMCS '12: Proceedings of the 4th International Conference on Internet Multimedia Computing and ServicePages 110–114https://doi.org/10.1145/2382336.2382367Easy duplication and distribution of digital works on Internet has facilitated copyright infringement problems in many ways. It's impossible to prevent illegal replication of the decrypted content just using content encryption and access control ...
- ArticleAugust 2012
Analyze the Digital Watermarking Security Demands for the Facebook Website
ICGEC '12: Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary ComputingPages 31–34https://doi.org/10.1109/ICGEC.2012.62When a digital service wants to protect its service quality, it needs to focus on the importance of copyright. Digital watermarking is commonly used as a protection mechanism for files posted on the Internet. in recent years, the launching of social ...
- research-articleAugust 2012
Privacy rights management in multiparty multilevel DRM system
ICACCI '12: Proceedings of the International Conference on Advances in Computing, Communications and InformaticsPages 625–631https://doi.org/10.1145/2345396.2345498Traditional Digital Rights Management (DRM) systems are one level distributor system which involve single distributor. However, for a flexible and scalable content distribution mechanism, it is necessary to accommodate multiple distributors in DRM model ...
- research-articleFebruary 2012
The impact of TPM on research and teaching: the story of the society for automotive engineers digital library
iConference '12: Proceedings of the 2012 iConferencePages 223–230https://doi.org/10.1145/2132176.2132205This paper describes the results of a study of the impacts of technological protection measures (TPM) and onerous pricing models on research and teaching in the field of mechanical engineering. The paper describes a case study of the 2006/2007 ...