Author of the publication

DRM Cloud Architecture and Service Scenario for Content Protection.

, , and . J. Internet Serv. Inf. Secur., 3 (3/4): 94-105 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Design of the Hash Functions With All-or-Nothing Property., and . J. Inf. Sci. Eng., 17 (6): 945-957 (2001)Framework of Service Accountability and Policy Representation for Trustworthy Cloud Services., , , and . CSA/CUTE, volume 373 of Lecture Notes in Electrical Engineering, page 437-443. Springer, (2015)DRM Cloud Architecture and Service Scenario for Content Protection., , and . J. Internet Serv. Inf. Secur., 3 (3/4): 94-105 (2013)A Study on the Recovery Method of PPG Signal for IPI-Based Key Exchange., , , , and . MUE/FutureTech, volume 518 of Lecture Notes in Electrical Engineering, page 353-358. Springer, (2018)Authorized Client-Side Deduplication Using CP-ABE in Cloud Storage., , , and . Wirel. Commun. Mob. Comput., (2019)All-or-Nothing Transform and Remotely Keyed Encription Protocols., , and . Public Key Cryptography, volume 1751 of Lecture Notes in Computer Science, page 178-195. Springer, (2000)An Image Steganography Using Pixel Characteristics., , , and . CIS (2), volume 3802 of Lecture Notes in Computer Science, page 581-588. Springer, (2005)Intelligent Access Control Mechanism for Ubiquitous Applications., and . ACIS-ICIS, page 955-960. IEEE Computer Society, (2007)Performance of Distributed Text Processing System Using Hadoop., , , and . J. Internet Serv. Inf. Secur., 4 (1): 12-24 (2014)A New Fingerprinting Codes for Multimedia Contents., , , and . MMM (2), volume 4352 of Lecture Notes in Computer Science, page 510-519. Springer, (2007)