Blockchain for digital rights management
Z Ma, M Jiang, H Gao, Z Wang - Future Generation Computer Systems, 2018 - Elsevier
Online digital content service becomes more and more easily, however, free consumption
and excessive spreading without rights protection will hurt the content providers' benefits …
and excessive spreading without rights protection will hurt the content providers' benefits …
The security and privacy of smart vehicles
The security and privacy of smart vehicles Page 1 Making Wireless Work Current traffic-safety
statistics are notoriously horrific. Approximately 40,000 people are killed each year on the …
statistics are notoriously horrific. Approximately 40,000 people are killed each year on the …
[LIVRE][B] Protocols for authentication and key establishment
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …
became outdated quickly. At the same time new developments have continued apace …
A framework for classifying and comparing architecture-centric software evolution research
Context: Software systems are increasingly required to operate in an open world,
characterized by continuous changes in the environment and in the prescribed …
characterized by continuous changes in the environment and in the prescribed …
Provably secure authenticated group Diffie-Hellman key exchange
E Bresson, O Chevassut, D Pointcheval - ACM Transactions on …, 2007 - dl.acm.org
Authenticated key-exchange protocols allow two participants A and B, communicating over a
public network and each holding an authentication means to exchange a shared secret …
public network and each holding an authentication means to exchange a shared secret …
Key agreement in dynamic peer groups
As a result of the increased popularity of group-oriented applications and protocols, group
communication occurs in many different settings: from network multicasting to application …
communication occurs in many different settings: from network multicasting to application …
Scyther: Semantics and verification of security protocols
CJF Cremers - 2006 - research.tue.nl
Recent technologies have cleared the way for large scale application of electronic
communication. The open and distributed nature of these communications implies that the …
communication. The open and distributed nature of these communications implies that the …
Scalable protocols for authenticated group key exchange
We consider the fundamental problem of authenticated group key exchange among n
parties within a larger and insecure public network. A number of solutions to this problem …
parties within a larger and insecure public network. A number of solutions to this problem …
[LIVRE][B] Security properties
Security Properties | SpringerLink Skip to main content Advertisement SpringerLink Account
Menu Find a journal Publish with us Track your research Search Cart Book cover …
Menu Find a journal Publish with us Track your research Search Cart Book cover …
Quantum key agreement protocol based on BB84
SK Chong, T Hwang - Optics Communications, 2010 - Elsevier
This work presents a quantum key agreement (QKA) based on the BB84 protocol. The newly
proposed QKA protocol enables two involved parties to jointly establish a shared secret key …
proposed QKA protocol enables two involved parties to jointly establish a shared secret key …