2009
DOI: 10.1016/j.compeleceng.2008.06.012
|View full text |Cite
|
Sign up to set email alerts
|

Digital rights management architectures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2009
2009
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 32 publications
(18 citation statements)
references
References 12 publications
0
18
0
Order By: Relevance
“…We calculated the number of elementary ranges for all constraints using N redistribution licenses generated in each experiment. Thus, in case of N = 3, if the j th constraint ranges for a permission in three licenses are [10,20], [15,25], and [20,25] then rj will be 5. Then, we simulate the equations: The comparison between direct method, modified direct method and our method for validation time (per issued license) and storage space (for N licenses) is shown in figure 6(a) and 6(b) respectively.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…We calculated the number of elementary ranges for all constraints using N redistribution licenses generated in each experiment. Thus, in case of N = 3, if the j th constraint ranges for a permission in three licenses are [10,20], [15,25], and [20,25] then rj will be 5. Then, we simulate the equations: The comparison between direct method, modified direct method and our method for validation time (per issued license) and storage space (for N licenses) is shown in figure 6(a) and 6(b) respectively.…”
Section: Resultsmentioning
confidence: 99%
“…Since it is not found so the point 5 is inserted along constraint dimension 2 as shown in figure 3(b). Since the point 5 divides the range (0,10] so a bit-vector same as that of the range (0,10] in figure 3(a) is assigned to both (0,5) and [5,10]. Similarly, the point 15 is inserted, as represented in figure 3(c).…”
Section: Transform For Multiple Licensesmentioning
confidence: 99%
See 1 more Smart Citation
“…Digital Rights Management (DRM) technology [45,82,85,124,193,196,218] primarily aims at the persistent protection of copyrighted digital content such as images, video, audio, book, games, text, or any combination thereof. In a nutshell, One major drawback of DRM is that it lacks any standards [65].…”
Section: Digital Rights Management (Drm)mentioning
confidence: 99%
“…These are the consumers DRM affects the most and the one crowd that gets little representation in DRM research. The cryptography sided research in DRM discusses how to implement a stronger form of protection using advanced algorithms and complicated frameworks (Heileman and Jamkhedkar, 2008). Such research is quick to forget that beyond the DRM implementation is a product that should appeal to a wide consumer base in order for it to meet full sales potential.…”
Section: Introductionmentioning
confidence: 99%