×
Summary. This paper proposes hash chain algorithm that generates more secure key than conventional method and secure encryption.
A Study on DRM System for On/Off Line Key Authentication · Kun-Won Jang, Chan-Kil Park, +1 author. Moon-seog Jun · Published in Security and Management 2006 ...
Kun-Won Jang, Chan-Kil Park, Jung-Jae Kim, Moon-Seog Jun: A Study on DRM System for On/Off Line Key Authentication. Security and Management 2006: 106-111.
Authors: Jang, K.-W.; Kim, J.-J.; Park, C.-K.; Jun, M.-S. Issue Date: 2006. Citation: 2006 International Conference on Security and Management, SAM'06.
A Study on DRM System for On/Off Line Key Authentication. Security and Management 2006: 106-111; 2003. [c2]. no documents available. no references & citations ...
People also ask
The invention relates to a DRM authentication method and system which can be taken off-line, belonging to the technical field of information security.
Missing: Study | Show results with:Study
The proposed system allows for both pluggable. (and transferable) security modules for end-user authentication and built-in (non-transferable) security modules ...
Abstract—Digital rights management (DRM) solutions aim to prevent the copying or distribution of copyrighted material. On mobile devices, a variety of DRM ...
By combining the techniques given in this paper, e-books are protected against copying, distributing, printing and unauthorized use while borrowing and ...
Nov 14, 2024 · This paper explores the role of cryptography and encryption technology in the evolution of digital rights management (DRM) in the gaming ...