2018
DOI: 10.1007/s11042-018-5614-4
|View full text |Cite
|
Sign up to set email alerts
|

A novel DRM scheme for accommodating expectations of personal use

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
20
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 13 publications
(20 citation statements)
references
References 16 publications
0
20
0
Order By: Relevance
“…Then compute scheme cost as sans-serifTsans-seriffe=1×0.0171, sans-serifTsans-serifh=17×0.00032 that conclude the final computation time of the respective scheme. Similarly, Odelu et al take 0.276 seconds, Doshi et al take 0.1298 seconds, Tsai and Lo take 0.8908 seconds, Mishra et al take 0.03214 seconds, Lee et al take 0.0236 seconds, Kumari and Khan take 0.1141 seconds, Xie et al take 0.1162 seconds, and Chen et al take 0.1967 seconds. To evaluate the total computation time of proposed scheme, we calculate 12×sans-serifTsans-serifh+1×sans-serifTsans-seriffe 0.02311ems.…”
Section: Performance Analysismentioning
confidence: 99%
See 3 more Smart Citations
“…Then compute scheme cost as sans-serifTsans-seriffe=1×0.0171, sans-serifTsans-serifh=17×0.00032 that conclude the final computation time of the respective scheme. Similarly, Odelu et al take 0.276 seconds, Doshi et al take 0.1298 seconds, Tsai and Lo take 0.8908 seconds, Mishra et al take 0.03214 seconds, Lee et al take 0.0236 seconds, Kumari and Khan take 0.1141 seconds, Xie et al take 0.1162 seconds, and Chen et al take 0.1967 seconds. To evaluate the total computation time of proposed scheme, we calculate 12×sans-serifTsans-serifh+1×sans-serifTsans-seriffe 0.02311ems.…”
Section: Performance Analysismentioning
confidence: 99%
“…The time stamp and random nonce will be 32‐bit output . We consider the communication cost of authentication phases of our proposed scheme for comparing with existing other schemes, namely, Kumari and Khan, Xie et al, Mishra et al, Lee et al, Chen et al, and Lee et al We assume identities/random number/biometric takes 32 bits. We use 128‐bit AES for encryption plaintext.…”
Section: Performance Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…Tsai and Lo 17 proposed an session key management protocol without disclosure of the identity of the client, which facilitates access of system without revealing his or her identity. Chen et al 18 gave a scheme to provide the digital right for accommodating expectations. We analyzed their system and observed that Chen et al's scheme did not achieve security against man in the middle and denial of service attack.…”
Section: Introductionmentioning
confidence: 99%