Password authentication with insecure communication
Communications of the ACM
Business models and transactions in mobile electronic commerce: requirements and properties
Computer Networks: The International Journal of Computer and Telecommunications Networking
Building customer trust in mobile commerce
Communications of the ACM - Digital rights management
Security architectures for controlled digital information dissemination
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
Electronic Copyright Management Systems: Requirements, Players and Technologies
DEXA '99 Proceedings of the 10th International Workshop on Database & Expert Systems Applications
Transaction Management for M-Commerce at a Mobile Terminal
HICSS '03 Proceedings of the 36th Annual Hawaii International Conference on System Sciences (HICSS'03) - Track 3 - Volume 3
Digital rights management for content distribution
ACSW Frontiers '03 Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003 - Volume 21
Digital rights management in a 3G mobile phone and beyond
Proceedings of the 3rd ACM workshop on Digital rights management
How DRM-based content delivery systems disrupt expectations of "personal use"
Proceedings of the 3rd ACM workshop on Digital rights management
A secure one-time password authentication scheme using smart cards without limiting login times
ACM SIGOPS Operating Systems Review
A fair and secure mobile billing system
Computer Networks: The International Journal of Computer and Telecommunications Networking
A Mobile Ticket System Based on Personal Trusted Device
Wireless Personal Communications: An International Journal
Digital contents interoperability between diverse DRM systems in mobile environment
CSECS'08 Proceedings of the 7th conference on Circuits, systems, electronics, control and signal processing
An efficient and reliable E-DRM scheme for mobile environments
Expert Systems with Applications: An International Journal
Ontologies for intellectual property rights protection
Expert Systems with Applications: An International Journal
A legally-admissible copyrights ownership identification protocol for digital works
Proceedings of the 4th International Conference on Internet Multimedia Computing and Service
Hi-index | 12.05 |
In recent years, intellectual property violation events have caused enterprise to respect digital content protection. Illegal copying digital content abuses become a serious problem. Because the mobile devices are more portable and individualized than personal computers, anyone can access the network resources at anytime from anywhere. However, valuable digital contents without proper protection make the content vulnerable to unauthorized copying, modification and re-distribution, causing revenue losses to service providers. Thus, constructing an effective Digital Right Management (DRM) system has become an important issue. On the basis of the mobile device, we propose an efficient digital rights management protocol. We apply symmetrical cryptosystem, asymmetrical cryptosystem, digital signature and one-way hash function mechanisms in our scheme. To overcome the computing resource weakness problem of mobile devices, we also integrate digital certificate, hardware information and one time password mechanisms such that the security, persistent protection, integrity, authentication, track usage of DRM work, changeable access right, integration and portability issues will be assured. In this way, the mobile user can access the digital content securely in the enterprise via authorization mechanism.