{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T04:43:35Z","timestamp":1725597815820},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642227257"},{"type":"electronic","value":"9783642227264"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22726-4_24","type":"book-chapter","created":{"date-parts":[[2011,7,25]],"date-time":"2011-07-25T16:11:49Z","timestamp":1311610309000},"page":"223-232","source":"Crossref","is-referenced-by-count":8,"title":["Vector Space Access Structure and ID Based Distributed DRM Key Management"],"prefix":"10.1007","author":[{"given":"Ratna","family":"Dutta","sequence":"first","affiliation":[]},{"given":"Dheerendra","family":"Mishra","sequence":"additional","affiliation":[]},{"given":"Sourav","family":"Mukhopadhyay","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"ANSI X9.62, Public Key Cryptography for the Financial Services Industry. The Elliptic Curve Digital Signature Algorithm (1999)","key":"24_CR1"},{"key":"24_CR2","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1109\/MIC.2003.1200302","volume":"7","author":"L.J. Camp","year":"2003","unstructured":"Camp, L.J.: First Principles of Copyright for DRM Design. IEEE Internet Computing\u00a07, 59\u201365 (2003)","journal-title":"IEEE Internet Computing"},{"doi-asserted-by":"crossref","unstructured":"Cohen, J.E.: DRM and Privacy. Communications of the ACM\u00a046(4) (April 2003)","key":"24_CR3","DOI":"10.1145\/641205.641230"},{"unstructured":"Dutta, R., Barua, R., Sarkar, P.: Pairing Based Cryptographic Protocols: A Survey. Manuscript (2004), http:\/\/eprint.iacr.org\/2004\/064","key":"24_CR4"},{"unstructured":"BlueKrypt: Cryptographic Key Length Recommendation, http:\/\/www.keylength.com\/en\/3\/","key":"24_CR5"},{"unstructured":"Grimen, G., Monch, C., Midtstraum, R.: Building Secure Software- based DRM systems. In: NIK 2006 (2006)","key":"24_CR6"},{"key":"24_CR7","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/35.883493","volume":"38","author":"F. Hartung","year":"2000","unstructured":"Hartung, F., Ramme, F.: Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications. IEEE Comm.\u00a038, 78\u201384 (2000)","journal-title":"IEEE Comm."},{"issue":"3","key":"24_CR8","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1016\/j.jss.2003.10.016","volume":"73","author":"S.O. Hwang","year":"2004","unstructured":"Hwang, S.O., Yoon, K.S., Jun, K.P., Lee, K.H.: Modeling and implementation of digital rights. Journal of Systems and Software\u00a073(3), 533\u2013549 (2004)","journal-title":"Journal of Systems and Software"},{"issue":"1","key":"24_CR9","doi-asserted-by":"publisher","first-page":"114","DOI":"10.4218\/etrij.05.0204.0043","volume":"27","author":"Y. Jeong","year":"2005","unstructured":"Jeong, Y., Yoon, K., Ryou, J.: A Trusted Key Management Scheme for Digital Rights Management. ETRI Journal\u00a027(1), 114\u2013117 (2005)","journal-title":"ETRI Journal"},{"key":"24_CR10","doi-asserted-by":"publisher","first-page":"423","DOI":"10.4218\/etrij.03.0103.0024","volume":"25","author":"J. Lee","year":"2003","unstructured":"Lee, J., Hwang, S., Jeong, S., Yoon, K., Park, C., Ryou, J.: A DRM Framework for Distribution Digital Contents through the Internet. ETRI Journal\u00a025, 423\u2013436 (2003)","journal-title":"ETRI Journal"},{"doi-asserted-by":"crossref","unstructured":"Liu, X., Huang, T., Huo, L.: A DRM Architecture for Manageable P2P Based IPTV System. In: IEEE Conference on Multimedia and Expo., pp. 899\u2013902 (July 2007)","key":"24_CR11","DOI":"10.1109\/ICME.2007.4284796"},{"doi-asserted-by":"crossref","unstructured":"Liu, Q., Safavi-Naini, R., Sheppard, N.P.: Digital Rights Management for Content Distribution. In: Proceedings of Australasian Information Security Workshop Conference on ACSW Frontiers 2003, vol. 21 (January 2003)","key":"24_CR12","DOI":"10.1145\/1029146.1029163"},{"doi-asserted-by":"crossref","unstructured":"Mulligan, D.K., Han, J., Burstein, A.J.: How DRM- Based Content Delivery Systems Disrupt Expectations of Personal Use. In: Proc. 2003 ACM Works. Digital Rights Management, pp. 77\u201388 (October 2003)","key":"24_CR13","DOI":"10.1145\/947380.947391"},{"doi-asserted-by":"crossref","unstructured":"Rosset, V., Filippin, C.V., Westphall, C.M.: A DRM Architecture to Distribute and Protect Digital Content Using Digital Licenses. Telecommunication, 422\u2013427 (July 2005)","key":"24_CR14","DOI":"10.1109\/AICT.2005.5"},{"doi-asserted-by":"crossref","unstructured":"Sachan, A., Emmanuel, S., Das, A., Kankanhalli, M.S.: Privacy Preserving Multiparty Multilevel DRM Architecture. In: IEEE Consumer Communications and Networking Conference (CCNC) (January 2009)","key":"24_CR15","DOI":"10.1109\/CCNC.2009.4784937"},{"issue":"11","key":"24_CR16","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to Share a Secret. Communications of the ACM\u00a022(11), 612\u2013613 (1979)","journal-title":"Communications of the ACM"},{"key":"24_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A. Shamir","year":"1985","unstructured":"Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 47\u201353. Springer, Heidelberg (1985)"}],"container-title":["Communications in Computer and Information Science","Advances in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22726-4_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,8]],"date-time":"2023-06-08T09:26:19Z","timestamp":1686216379000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22726-4_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642227257","9783642227264"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22726-4_24","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}