[1] Delettre C, Boudaoud K, Riveill M. Cloud computing,security and data concealment [C]// Proceedings of 2011 IEEE Symposium on Computers and Communications (ISCC). Piscataway, USA: IEEE,2011: 424-431.[2] Chen D, Zhao H. Data security and privacy protection issues in cloud computing [C]//Proceedings of 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE). Piscataway,USA: IEEE, 2009: 647-651.[3] Jang E, Koh B, Choi Y. An authentication mechanism of digital contents in pervasive computing environment [C]//Proceedings of 2008 International Conference on Information Security and Assurance (ISA).Piscataway, USA: IEEE, 2008: 527-533.[4] Hartung F, Ramme F. Digital rights management and watermarking of multimedia content for mcommerce applications [J]. Communications Magazine,IEEE, 2000, 38(11): 78-84.[5] Ei Aimani L, Raekow Y. Reselling digital content [C]//Proceedings of ARES’10 International Conference on Availability, Reliability and Security. Piscataway,USA: IEEE, 2010: 391-396.[6] Azad M M, Ahmed A H S, Alam A. Digital rights management [J]. International Journal of Computer Science and Network Security, 2010, 10(11): 24-33.[7] Adobe content server [EB/OL]. (2013-10-28). http://en.wikipedia.org/wiki/adobe content server, 2013.[8] Feijo B. Visualization, digital content, and simulation[J]. MultiMedia, IEEE, 2009, 16(1): 8-12.[9] US 20020077988 A1, Distributing digital content [S].[10] Liu Q, Safavi-Naini R, Sheppard N P. Digital rights management for content distribution [C]//Proceedings of the Australasian Information Security Workshop Conference on ACSW Frontiers. Darlinghurst, Australia:Australian Computer Society, 2003: 49-58.[11] US 6697944 B1, Digital content distribution, transmission and protection system and method, and portable device for use therewith [S].[12] Lin Lun-yu. Design and implementation of a mechanism for document protection and recording: Using PDF and TXT documents as examples [D]. Hsinchu,China: Institute of Computer Science and Engineering,National Chiao Tung University, 2008 (in Chinese).[13] Lu Pei-chun, Juang Wen-shenq. Secure and efficient data and privacy protection mechanisms in cloud computing[C]//Proceedings of the 18th Conference on Information Management & Practice. Taipei, China:CSIM, 2012 (in Chinese).[14] Wu S, Zhu Y. Efficient and secure password-based authenticated key exchange protocol [C]//Proceedings of 2006 International Conference on Computational Intelligence and Security. Piscataway, USA: IEEE, 2006:1269-1272.[15] Amara M, Siad A. Elliptic curve cryptography and its application [C]//Proceedings of 2011 7th International Workshop on Systems, Signal Processing and their Applications. Piscataway, USA: IEEE, 2011: 247-250.[16] FIPS-PUB-198, The keyed-hash message authentication code [S]. |