By Topic

Identity based protocols for secure electronic content distribution and licensing

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Oikonomidis, N. ; Inst. for Data Commun. Syst., Siegen Univ., Germany ; Ruland, C.

Contemporary systems for distribution of electronic media content and its respective licenses are limited in a way that neither the consumers nor the vendors can operate in a reliable and flexible way. Further, the security architecture that comprises these systems is based and literally mapped upon them from security architectures, which apply to distributed systems based on computer terminals and not necessarily on mobile devices. The attempt to apply such architectures on the world of mobile multimedia so far has lead to solutions, which mostly rely on one single certification authority. It is more than obvious that this fact introduces the fatal risk of having a single-point-of-attack, since a compromise of the CA's private key leads to a compromise of the entire system. Our proposal introduces protocols that utilize ID-based cryptographic methods, in order to provide electronic content delivery and licensing.

Published in:

Web Delivering of Music, 2004. WEDELMUSIC 2004. Proceedings of the Fourth International Conference on

Date of Conference:

13-14 Sept. 2004