The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
Advances in Multimedia Information Processing – PCM 2007
DOI: 10.1007/978-3-540-77255-2_26
|View full text |Cite
|
Sign up to set email alerts
|

Implementing DRM over Peer-to-Peer Networks with Broadcast Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 15 publications
0
3
0
Order By: Relevance
“…A typical approach to realize a secure content delivery in P2P environment is to use Digital Right Management (DRM) technology [8], [15], [19], [20]. DRM controls the usage and the redistribution of digital contents using several key technologies such as public-key cryptography.…”
Section: Related Workmentioning
confidence: 99%
“…A typical approach to realize a secure content delivery in P2P environment is to use Digital Right Management (DRM) technology [8], [15], [19], [20]. DRM controls the usage and the redistribution of digital contents using several key technologies such as public-key cryptography.…”
Section: Related Workmentioning
confidence: 99%
“…Although many online resources currently being shared over a network are free or open access (e.g., YouTube and BitTorrent), there is a strong demand to distribute a given media file only to paid users in a secure and cost-effective manner. Recently, Peer-to-Peer Content Delivery Networks (P2P CDNs) have attracted considerable attention as a cost-effective way to deliver large media files to many users in a given computer network [12], [15], [16]. Content delivery in a P2P CDN is invoked by the owner of a media file by pushing a copy of the file to the P2P overlay, and once a copy is available in the overlay, it will be delivered to the authorized recipients by repeating local communication among nearby peers in the P2P overlay, where the authorized peer is a peer who paid for the content and received an authority from the distribution agent (DA) of the P2P CDN.…”
Section: Introductionmentioning
confidence: 99%
“…P2P suitable DRM systems [7][8][9][10][11] can be categorized into four types, i.e., server-client based architecture, distributed architecture, semi-distributed architecture and super-node based architecture. In server-client based architecture, P2P networks are used only as the channels of content distribution, while all the licenses are issued by the DRM server.…”
Section: Introductionmentioning
confidence: 99%