Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Cryptography: Theory and Practice,Second Edition
Cryptography: Theory and Practice,Second Edition
Secure mobile electronic card used in medical services
ACC'08 Proceedings of the WSEAS International Conference on Applied Computing Conference
Solution for non-repudiation in GSM WAP applications
SEPADS'08 Proceedings of the 7th WSEAS International Conference on Software Engineering, Parallel and Distributed Systems
Smart card based solution for non-repudiation in GSM WAP applications
WSEAS Transactions on Computers
E-cards and e-Health: an ethics point of view
AIKED'09 Proceedings of the 8th WSEAS international conference on Artificial intelligence, knowledge engineering and data bases
Hi-index | 0.00 |
The new trend in mobile applications world is to securely ensure a variety of content for all the customers. Since the providers invest large amounts of money in producing multimedia content such as m-applications, presentations, advertising, music clips and games, there should be considered some sensitive problems regarding the "forward lock" issue, in particular the content transfer from one mobile device to another. This paper presents models for handling digital rights management problems and a proposal for a practical distributed secure architecture used in a complex model for massive secure distribution of m-contents. Also, the concepts related to m-application, xml signature, keys management, and secure architectures are combined in a practical manner that helps the researchers, designers and developers from IT&C field to consider multifarious approaches of the digital rights management issues.