Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
JPEG 2000: Image Compression Fundamentals, Standards and Practice
JPEG 2000: Image Compression Fundamentals, Standards and Practice
Terra: a virtual machine-based platform for trusted computing
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Proceedings of the 11th ACM conference on Computer and communications security
Protocols that hide user's preferences in electronic transactions
Computer Networks: The International Journal of Computer and Telecommunications Networking
Reducing TCB size by using untrusted components: small kernels versus virtual-machine monitors
Proceedings of the 11th workshop on ACM SIGOPS European workshop
Anonymous connections and onion routing
IEEE Journal on Selected Areas in Communications
Overview of fine granularity scalability in MPEG-4 video standard
IEEE Transactions on Circuits and Systems for Video Technology
Secure offline superdistribution for mobile platforms
International Journal of Applied Cryptography
Privacy preserving DRM solution with content classification and superdistribution
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Privacy rights management in multiparty multilevel DRM system
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
Hi-index | 0.00 |
Traditional superdistribution citemori: superdistribution approaches do not address consumer privacy issues and also do not reliably prevent the malicious consumer from indiscriminately copying and redistributing the decryption keys or the decrypted content. The layered nature of common digital content can also be exploited to efficiently provide the consumer with choices over the quality of the content, allowing him/her to pay less for lower quality consumption and vice versa. This paper presents a system that superdistributes encrypted layered content and (1) allows the consumer to select a quality level at which to decrypt and consume the content; (2) prevents the merchant from knowing which exact content package is consumed by the consumer, hence enhancing consumer privacy; and (3) through trusted access control, prevents the consumer from indiscriminately copying and redistributing the decryption keys or the decrypted content, thus achieving a form of digital rights management.