On the security and practicality of a buyer seller watermarking protocol for DRM.
Geong Sen PohMuhammad Reza Z'abaPublished in: SIN (2011)
Keyphrases
- trusted third party
- electronic commerce
- digital rights management
- third party
- copyright protection
- transaction costs
- security protocols
- cryptographic protocols
- authentication protocol
- key agreement protocol
- mutual authentication
- communication protocols
- security services
- key exchange protocol
- security properties
- security analysis
- rfid systems
- security model
- lightweight
- key distribution
- mobile payment
- trusted computing
- digital content
- intrusion detection
- digital images
- denial of service attacks
- information security
- access control
- protocol specification
- digital signature
- security issues
- security requirements
- contractual obligations
- public key
- security mechanisms
- credit card
- physical layer
- elliptic curve
- seller agents
- usage control
- network security
- provably secure
- diffie hellman
- watermarking algorithm
- security policies
- watermarking technique
- trust negotiation
- business models
- messages exchanged
- smart card
- semi honest
- content sharing