共 50 条
- [1] Trusted Computing Based Mobile DRM Authentication Scheme [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 7 - +
- [2] Enforcing regional DRM for multimedia broadcasts with and without trusted computing [J]. DIGITAL RIGHTS MANAGEMENT: TECHNOLOGIES, ISSUES, CHALLENGES AND SYSTEMS, 2006, 3919 : 332 - 340
- [4] A Fair-use DRM System based on Web Service [J]. ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 3, PROCEEDINGS, 2008, : 11 - +
- [5] Trusted platforms, DRM, and beyond - Introduction [J]. DIGITAL RIGHTS MANAGEMENT: TECHNOLOGICAL, ECONOMIC, LEGAL AND POLITICAL ASPECTS, 2003, 2770 : 178 - 205
- [6] An implementation of a trusted and secure DRM architecture [J]. ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2006: OTM 2006 WORKSHOPS, PT 1, PROCEEDINGS, 2006, 4277 : 312 - +
- [7] Enriched Trusted Platform and its Application on DRM [J]. APTC 2008: THIRD ASIA-PACIFIC TRUSTED INFRASTRUCTURE TECHNOLOGIES CONFERENCE, PROCEEDINGS, 2008, : 91 - 97
- [8] Nuovo DRM paradiso: Towards a verified fair DRM scheme [J]. INTERNATIONAL SYMPOSIUM ON FUNDAMENTALS OF SOFTWARE ENGINEERING, PROCEEDINGS, 2007, 4767 : 33 - +
- [9] Towards a Secure Fair MAC in Wireless Ad Hoc Networks Using Trusted Computing Technology [J]. 2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012, : 1023 - 1028
- [10] Challenges for Trusted Computing [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006, PROCEEDINGS, 2006, 4249 : 414 - 414