Access Policy Based Key Management in Multi-level Multi-distributor DRM Architecture.
Ratna DuttaDheerendra MishraSourav MukhopadhyayPublished in: InfoSecHiComNet (2011)
Keyphrases
- key management
- digital rights management
- resource constrained
- wireless sensor networks
- access control
- real time
- key management scheme
- provably secure
- ad hoc networks
- key distribution
- digital signature
- secret key
- identity based cryptography
- access control policies
- software architecture
- security services
- secure communication
- response time
- resource constraints
- digital content
- computing environments
- security protocols
- elliptic curve
- data distribution
- mobile devices
- high dimensional
- metadata