数字版权管理中权限交互与容错认证机制研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
基于网络的数字多媒体应用是当前多媒体技术发展的趋势,网络和媒体的结合给用户提供了灵活便捷的多媒体获取方式,提高了用户的工作效率和生活质量。但是在给用户带来方便的同时,网络多媒体内容也面临着严重的盗版威胁,基于网络的数字版权管理是目前解决这一问题最有前途的研究方向。
     本文以面向网络的数字版权管理中权限交互和分布式容错认证机制等问题作为主要研究内容,对这一领域展开了一些探索性研究工作。首先,本文对现有的网络数字版权管理系统框架以及研究工作进行了总结分析,指出如何通过技术手段改进现有数字版权管理的权限交互机制是其当前面临的一个新的关键问题。对此,本文从数字权限共享和数字版权管理互操作机制两方面对这一问题进行了研究。其次,分析了数字版权管理在P2P网络中的研究与应用和存在的问题,分析表明P2P模式下无中心的节点认证是P2P的数字版权保护中一个重要的环节,针对这一问题也进行了深入的探讨。论文的主要工作以及创新点如下:
     1.提出一种基于数字票据的在线数字版权管理权限共享机制。首先分析了权限共享问题在数字版权管理用户体验中的作用以及潜在的商业模式应用;其次给出了一种适合数字版权管理的数字票据通用设计格式;然后结合典型的数字版权管理系统给出了基于数字票据的数字权限共享模型;最后设计了一种基于数字票据的轻量级数字权限共享协议并证明其安全性。
     2.结合一种新颖的在线虚拟家庭影院应用模式,实现了一个基于数字票据的在线DRM视频分享原型系统Virtual Theater。首先基于提出的共享机制具体描述了该系统的结构与组成;其次,总结了在线分享DRM视频内容的基本流程,并提出了一种新颖的基于数字权限共享的应用场景和商业模式;最后,通过性能测试说明Virtual Theater的性能优势。
     3.提出一种具有个人隐私保护的分布式数字版权管理互操作机制:DPP-DRM。首先分析了以往数字家庭网络中由于集中存储而带来的DRM互操作和个人隐私泄露问题;然后针对上述问题,提出一种新颖的基于CoralIF的互操作机制,该机制在客户端分配用户信息并分布式记录用户交易记录和域管理等个人隐私信息;最后使用串空间理论证明DPP-DRM能够在媒体中心被攻破的情况下,仍能够保证设备成员列表和权限令牌等关键信息的安全。
     4.提出了一种高效的面向P2P DRM的基于集群的Byzantine容错节点认证机制。首先总结了P2P网络中DRM的研究;其次重点介绍P2P网络中Byzantine认证机制以及在P2P DRM系统中应用时存在的节点间交互消息过多的问题。然后,针对这一问题,提出一种基于集群的Byzantine容错认证算法,通过算法分析,证明了这种算法的优势。
Internet based multimedia application is the evolution trend of multimedia techniques. The combination of networks and multimedia provides users with a flexible and convenient way to obtain multimedia content, and improves users’work efficiency and quality of their lives. While people enjoy the convenient that multimedia technology brings to us, multimedia content also faces serious piracy threat. Network based DRM (Digital Rights Management) is the most promising solution to this problem.
     The dissertation focuses on research topics of network based DRM. Firstly, we analyze existing DRM system architecture, and summarize related works on network based DRM research topics. We conclude that how to improve rights interaction scheme through technical methods is a key issue in current DRM system. Based on this conclusion, DRM rights sharing and DRM interoperability are firstly studied as our research emphasises. Secondly, we analyze the DRM applicationes and research issues in P2P network. Analysis results show that peer authentication without trusted authority center plays an important role in deploying a secure and stable DRM system in large scale P2P network. The main contribution of this dissertation can be summarized as follows:
     1. A novel rights sharing scheme based on a light-weighted digital ticket transfer protocol is proposed for online DRM system. We firstly analyze the importance of rights sharing in DRM system and its competence to develop new application and business models. Secondly, a universal digital ticket format is proposed for DRM rights sharing. Thirdly, a novel DRM rights sharing model is given based on proposed sharing scheme and typical DRM system architecture. Lastly, we design a light-weighted rights sharing protocol.
     2. We implement a prototype system for network based DRM content sharing within online customers using proposed rights sharing scheme based on a light-weighted digital ticket transfer protocol. Key components and their function are presented as well as system work flow. We also propose a novel business model based on proposed rights sharing scheme. The evaluation results indicate that the overhead of our scheme is reasonable compare to other systems.
     3. A Distributed and Privacy Protected DRM interoperability framework (DPP-DRM) is proposed for digital home network based on CoralIF. The framework locates the role of Domain Manager and Rights Registry to device in a home domain, then the centralized store of transaction record and domain management information becomes distributed store of every user’s own privacy information. So the proposed server load is reduced and user privacy is protected. Formal analysis indicates that critical information such as rights token and device management list can be still secure even if the media center is compromised.
     4. An efficient peer authentication scheme is proposed using cluster based Byzantine fault tolerance authentication for P2P DRM system. Algorithm analysis shows our scheme greatly reduces the number of message during Byzantine agreement procedure.
引文
[1] Bittorrent, http://www.bittorrent.com, 2009.
    [2]迅雷, www.xunlei.com, 2009.
    [3] eMule, http://www.emule-project.net, 2009.
    [4] INDICARE Consumer Surveys, Digital Video Usage and DRM, Results from a European Consumer Survey, Berlin, 23 Feb 2006.
    [5] INDICARE Consumer Surveys, DRM and Consumer Acceptability, Results from a European Consumer Survey, Berlin, 23 Feb 2006
    [6] 2008互联网音乐调查报告, Jul 2008. http://www.indiechina.com/file/The_2008_Digital_Music_Survey.pdf
    [7] iTunes, http://www.apple.com/itunes, 2009
    [8] Microsoft Zune, http://www.zune.com, 2009
    [9]迅雷看看,http://kankan.xunlei.com, 2009
    [10] Garnett N. Digital Rights Management, copyright, and Napster.ACM SIGecom Exchanges,2001,2(2):1-5
    [11] Qiong Liu , Reihaneh Safavi-Naini , Nicholas Paul Sheppard, Digital rights management for content distribution, Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003, p.49-58, February 01, 2003, Adelaide, Australia
    [12] S. Bechtold. The Present and Future of Digital Rights Management Musings on Emerging Legal Problems. In E. Becker et al. (eds.): Digital Rights Management, LNCS 2770, 597-654, 2003. Springer-Verlag Berlin Heidelberg.
    [13]俞银燕,汤帜.数字版权保护技术研究综述.计算机学报, 2005, 12:1958-1968.
    [14] Content Scramble System, http://en.wikipedia.org/wiki/Content_Scramble_System. 2009
    [15] Digital Rights Management, http://en.wikipedia.org/wiki/DRM, 2009.
    [16] Advanced Access Content System, http://en.wikipedia.org/wiki/Advanced_Access_Content_System. 2009
    [17] Conditional access system, http://en.wikipedia.org/wiki/Conditional_access_system. 2009
    [18] Sony BMG, http://en.wikipedia.org/wiki/Sony_BMG.. 2009
    [19] Microsoft, Microsoft Windows Media Digital Rights Management, http://www.microsoft.com/windows/windowsmedia/forpros/drm/default.mspx. 2009
    [20] IBM's Electronic Music Management System (EMMS),‘Computer Science Research at Almaden’, http://www.almaden.ibm.com/cs/madison.html, 2009
    [21] FairPlay, http://en.wikipedia.org/wiki/FairPlay, 2009.
    [22] Real Networks: Helix DRM. http://www.realnetworks.com/products/drm/index.html, 2009.
    [23] Safenet, http://www.safenet-inc.com, 2009.
    [24] Thomson, http://www.thomson.net, 2009.
    [25] Verimatrix, http://www.verimatrix.com, 2009.
    [26] Widevine, http://www.widevine.com, 2009.
    [27] Coral Consortium, http://www.coral-interop.org, 2009.
    [28] Haihaisoft, http://www.haihaisoft.com, 2009.
    [29] Open Mobile Alliance, http://www.openmobilealliance.org/, 2009.
    [30] Open Mobile Alliance, DRM Specification: Approved Version 2.0, 2006.
    [31] Chiariglione, L., Balancing protection of intellectual property and its use, Automated Production of Cross Media Content for Multi-Channel Distribution, 2005. AXMEDIS 2005. First International Conference on, Dec. 2005.
    [32] Free Software Foundation. Digital Restrictions Management and Treacherous Computing. http://www.fsf.org/campaigns/drm.html. 2009
    [33] Analog Hole, http://en.wikipedia.org/wiki/Analog_hole, 2009.
    [34] Jonker, W.; Linnartz, J.-P., "Digital rights management in consumer electronics products," Signal Processing Magazine, IEEE , vol.21, no.2, pp. 82-91, Mar 2004
    [35] Sony BMG CD copy protection scandal, http://en.wikipedia.org/wiki/2005_Sony_BMG_CD_copy_protection_scandal, 2009.
    [36] Iannella, R. Digital Rights Management (DRM) Architectures. D-Lib Magazine, 7(6), Jun. 2001.
    [37] Windows Media DRM应用http://www.microsoft.com/windows/windowsmedia/cn/drm/scenarios.aspx. 2009
    [38] [MS-DRM]: Digital Rights Management License Acquisition Data Structure, Microsoft Development Network Library, rev. 2.0, April 6, 2009.
    [39] W. Zeng, H. Yu and C. Lin (Editors), Multimedia Security Technologies for Digital Rights Management, ISBN:0-12-369476-0, Elsevier, July 2006
    [40] Borko Furht (Editor), Darko Kirovski (Editor), Multimedia Security Handbook (Internet and Communications), ISBN-13: 978-0849327735, CRC, 1 Edition, December 28, 2004.
    [41] Cheun Ngen Chong, Ricardo Corin, Sandro Etalle, Pieter Hartel, Willem Jonker, and Yee Wei Law. LicenseScript: A novel digital rights language and its semantics. In Third International Conference on the Web Delivery of Music, pages 122–129, Los Alamitos, CA, Sept. 2003.
    [42] Joseph Y. Halpern and Vicky Weissman. A formal foundation for XrML licenses. In Proceedings of the 17th IEEE Computer Security Foundations Workshop, pages 251–265, Asilomar, CA, June 2004.
    [43] Riccardo Pucella and Vicky Weissman. A formal foundation for ODRL, Jan. 2006. http://arxiv.org/abs/cs.LO/0601085
    [1] C. Gunter, S. Weeks, and A. Wright. Models and languages for digital rights. In Proceedings of the 34th Annual Hawaii International Conference on System Sciences (HICSS-34), pages 4034–4038, Maui, Hawaii, United States, January 2001. IEEE Computer Society Press.
    [2] Josep Polo, Jose Prados, and Jaime Delgado. Interoperability between ODRL and MPEG-21 REL. In Proceedings of the first international ODRL workshop, Vienna, Austria, Apr. 2004.
    [3] Joseph Y. Halpern and Vicky Weissman. A formal foundation for XrML licenses. In Proceedings of the 17th IEEE Computer Security Foundations Workshop, pages 251–265, Asilomar, CA, June 2004.
    [4] Riccardo Pucella and Vicky Weissman. A formal foundation for ODRL, Jan. 2006. http://arxiv.org/abs/cs.LO/0601085
    [5] Adam Barth and John C. Mitchell. Managing digital rights using linear logic. In LICS’06: Proceedings of the 21st Annual IEEE Symposium on Logic in Computer Science, pages 127–136,Washington, DC, USA, 2006. IEEE Computer Society.
    [6] Markus Holzer, Stefan Katzenbeisser, and Christian Schallhart. Towards formal semantics for ODRL. In ODRL Workshop, pages 137–148, Vienna, Austria, 2004.
    [7] Cheun Ngen Chong, Ricardo Corin, Sandro Etalle, Pieter Hartel, Willem Jonker, and Yee Wei Law. LicenseScript: A novel digital rights language and its semantics. In Third International Conference on the Web Delivery of Music, pages 122–129, Los Alamitos, CA, Sept. 2003.
    [8] Jamkhedkar, P. A. and Heileman, G. L. 2008. A formal conceptual model for rights. In Proceedings of the 8th ACM Workshop on Digital Rights Management (Alexandria, Virginia, USA, October 27 - 27, 2008). DRM '08. ACM, New York, NY, 29-38.
    [9] B. B. Zhu, Y. Yang, and S. Li. JPEG 2000 encryption enabling fine granularity scalability without decryption, IEEE Int. Symp. Circuits and Systems, 6:6304–6307, May 2005.
    [10] W. Zeng, H. Yu and C. Lin (Editors), Multimedia Security Technologies for Digital Rights Management, ISBN:0-12-369476-0, Elsevier, July 2006
    [11] Borko Furht (Editor), Darko Kirovski (Editor), Multimedia Security Handbook (Internet and Communications), ISBN-13: 978-0849327735, CRC, 1 Edition, December 28, 2004.
    [12]卿斯汉,安全协议的设计与逻辑分析,软件学报, 2003年第07期.
    [13]冯登国编著,《密码分析学》,清华大学出版社, 2000, 08.
    [14] Meadows C. Formal verification of cryptographic protocols: A survey. In: Advances in Cryptology, Asiacrypt’96 Proceedings. LNCS 1163, Berlin: Springer-Verlag, 1996, 135~150.
    [15] Thayer FJ, Herzog JC, Guttman JD. Strand spaces: Why is a security protocol correct? In Proceedings of the 1998 IEEE Symposium on Security and Privacy. Los Alamitos: IEEE Computer Society Press, 1998. 160-171.
    [16] Thayer FJ, Herzog JC, Guttman JD. Strand spaces: Proving security protocols correct. Journal of Computer Security, 1999, 7(2-3): 191-230.
    [17] Dolev D, Yao A. On the security of public key protocol. IEEE Transactions on Information Theory, 1983,29(2):198-208.
    [18]沈海峰,薛锐,黄河燕,陈肇雄,串空间理论扩展.软件学报, 2005第10期第16卷
    [19] Meadows, C., Formal methods for cryptographic protocol analysis: emerging issues and trends. Selected Areas in Communications, IEEE Journal on , vol.21, no.1, pp. 44-54, Jan 2003
    [1] INDICARE Consumer Surveys, Digital Video Usage and DRM, Results from a European Consumer Survey, Berlin, 23 Feb 2006.
    [2] Kwok S. H., Lui S. M., A License management model to support B2C and C2C music sharing. In: Proceedings of the 10th International World Wide Web Conference (WWW10), Hong Kong, 2001, 126-137.
    [3] C. Conrado, M. Petkovic, M. van der Veen, W. van der Velde, Controlled Sharing of Personal Content using Digital Rights Management, Journal of Research and Practice in Inf. Tech., vol. 38, no.1, Feb. 2006
    [4] Liu, Q., Safavi-Naini, R., Sheppard, N. P., Digital Rights Management for Content Distribution, 2003, Conferences in Research and Practice in Information Technology Series, Vol. 34, p. 49-58
    [5] Iannella, R. Digital Rights Management (DRM) Architectures. D-Lib Magazine, 7(6), Jun. 2001.
    [6] Nair, S.K.; Popescu, B.C.; Chandana Gamage; Crispo, B.; Tanenbaum, A.S., "Enabling DRM-preserving digital content redistribution," E-Commerce Technology, 2005. CEC 2005. Seventh IEEE International Conference on , vol., no., pp. 151-158, 19-22 July 2005
    [7] Nair, S.K.; Crispo, B.; Tanenbaum, A.S.; Gerrits, R., "Turning Teenagers into Stores," Computer , vol.41, no.2, pp.58-62, Feb. 2008
    [8] F. Pestoni, J. B. Lotspiech, and S. Nusser. xCP: Peer-to-peer content protection. IEEE Signal Processing Magazine, 21(2):71–81, 2004.
    [9] B. C. Popescu, B. Crispo, A. S. Tanenbaum, and F. L.A. J. Kamperman. A DRM security architecture for home networks. In ACM Workshop on Digital Rights Management, pages 1–10, 2004.
    [10] Open Mobile Alliance, DRM Specification: Approved Version 2.0, 2006.
    [11] K. Fujimura and Y. Nakajima, General-purpose Digital Ticket Framework, 3rd USENIX Workshop on Electronic Commerce, August 1998, pp. 177-186.
    [12] K.Fujimura, H. Kuno, M. Terada, K.Matsuyama, Y. Mizuno and J. Sekine. Digital Ticket Controlled Digital Ticket Circulation, proceedings of the 8th USENIX Security Symposium, Washington D.C., USA, pp. 229-238, 1999.
    [13] K.Matsuyama, K. Fujimura, Distributed Digital-Ticket Management for Rights Trading System, Proceeding of the 1st ACM Conference on Electronic Commerce, pp.110-118, Nov. 1999
    [14] Lin, C. C., Wu, C. C. and Chang, C. C. Digital Right Schemes for Limited Issue and Flexible Division, International Journal of Computer Science & Network Security, Feb. 2008.
    [15] F. Bao,“A Scheme of Digital Ticket for Personal Trusted Device,”Proceedings of the 15th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2004), Vol. 4, pp. 3065-3069, 2004.
    [16] R. Song and L. Korba,“How to Make E-cash with Nonrepudiation and Anonymity,”Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC’04), Vol. 2, pp. 167– 172, Las Vegas, Nevada, USA, Apr. 2004.
    [1] YouTube, http://www.youtube.com, 2009.
    [2]优酷, http://www.youku.com, 2009.
    [3] PPLive, http://www.pplive.com, 2009.
    [4] Super Distribution, http://en.wikipedia.org/wiki/Superdistribution, 2009.
    [5]电影业:互联网兵临城下, http://all.zcom.com/article/584/a6611/, 2009.
    [6]数字出版在线, http://www.epuber.com/, 2009.
    [7] Kirovski D, Peinado M, Petitcolas FAP (2001) Digital rights management for digital cinema. In: International symposium on optical science and technology, security in imaging, theory and applications, San Diego, Calif., July 2001.
    [8] Windows media 10 SDKs, http://www.microsoft.com/windows/windowsmedia/forpros/platform/sdk.aspx, 2009
    [9] MSN Messenger Protocol, http://www.hypothetic.org/docs/msn/, 2009.
    [10] Lin, C. C., Wu, C. C. and Chang, C. C. Digital Right Schemes for Limited Issue and Flexible Division, International Journal of Computer Science & Network Security, Feb. 2008.
    [11] http://en.wikipedia.org/wiki/Long_tail, 2008
    [1] N. Rump. Can Digital Rights Management Be Standardized? IEEE Signal Processing Magazine, Mar 2004, 21:63-70.
    [2] A.U.Schmidt, O.Tafreschi, R.Wolf. Interoperability Challenges for DRM Systems. In: IFIP/GI Workshop on Virtual Goods, Ilmenau (Germany), May 2004.
    [3] R. Safavi-Niani, N. Sheppard, and T. Uehara. Import/Export in Digital Rights Management. In: Proceedings of the 4th ACM Workshop on Digital Rights Management. Washington: 1997, 99-110,.
    [4] Digital rights management, http://en.wikipedia.org/wiki/Digital_rights_management. 2009
    [5] Coral consortium, http://www.cora.-interop.org/.
    [6] Digital Media Project, http://digital-media-project.org/
    [7] Geer, D. Digital rights technology sparks interoperability concerns. Computer , 2004, 37(12): 20-22.
    [8] Gelareh Taban, Alvaro A.Cardenas, Virgil D. Gligor, Towards a Secure and Interoperable DRM Architecture. In: Proceedings of the ACM Digital Rights Management workshop DRM’06, 2006, Alexandria: 69-78.
    [9] Serrao, C.; Dias, M.; Delgado, J., Key Management in Open DRM Platforms. Automated Production of Cross Media Content for Multi-Channel Distribution, 2007. AXMEDIS '07. Third International Conference on , vol., no., pp.47-54, 28-30 Nov. 2007
    [10] R. H. Koenen, J. Lacy, M. Mackay, and S. Mitchell. The Long March to Interoperable Digital Rights Management. In: Proceedings of the IEEE, 2004, 92(6): 883-897.
    [11] W. B. Bradley and D. P. Maher. The NEMO P2P service orchestration framework. In: Thirty-seventh Hawaii International Conference on System Sciences. 2004: 290-299.
    [12] P.A.Jamkhedkar, G.L.Heileman. DRM Interoperability Analysis from the Perspective of a Layered Framework. In: Proceedings of the ACM Digital Rights Management workshop DRM’05, 2005, Alexandria: 17-26.
    [13] S.Michiels, K.Verslype, W.Joosen, B.De Decker. Towards a Software Architecture for DRM. In: Proceedings of the ACM Digital Rights Management workshop DRM’05, 2005, Alexandria: 65-74.
    [14] B.C.Popescu, B.Crispo, A.Tanenbaum, F.Kamperman. A DRM Security Architecture for Home Networks. Proceedings of the ACM Digital Rights Management workshop DRM’04, 2004, Washington: 1-10.
    [15] D.W.Kravitz, T.S.Messerges. Achieving Media Portability through Local Content Translation and End-to-End Rights Management. In: Proceedings of the ACM Digital Rights Management workshop DRM’05, 2005, Alexandria: 27-36.
    [16] Intertrust’s Coral and Marlin, http://www.intertrust.com/main/research/initiatives.html, 2009
    [17] The Coral Consortium, Providing Interoperability with Windows Media DRM,
    [18] http://www.coral-interop.org/main/news/Coral_MSInterop.pdf, 2006.
    [19] The Coral Consortium, Coral Consortium Whitepaper, http://www.coral-interop.org/main/news/Coral.whitepaper.pdf, 2006.
    [20] Fabrega. F, Herzog. J, Guttman. J., Strand spaces: why is a security protocol correct?, Security and Privacy, 1998. Proceedings. 1998 IEEE Symposium on , vol., no., pp.160-171, 3-6 May 1998
    [21] GUTTMAN J, THAYER F. Authentication tests and the structure of bundles. Theoretical Computer Science, 2002, 283(2): 333-380.
    [1] PPLive, http://www.pplive.com, 2009.
    [2] Iwata, T.; Abe, T.; Ueda, K.; Sunaga, H., A DRM system suitable for P2P content delivery and the study on its implementation. Communications, 2003. APCC 2003. The 9th Asia-Pacific Conference on , vol.2, no., pp. 806-811 Vol.2, 21-24 Sept. 2003
    [3] Garfinkel, S. PGP: Pretty Good Privacy. O'Reilly & Associates, Inc., Cambridge, MA, 1995.
    [4] Chu, C.C.; Su, X.; Prabhu, B.S.; Gadh, R.; Kurup, S.; Sridhar, G.; Sridhar, V., Mobile DRM for multimedia content commerce in P2P networks. Consumer Communications and Networking Conference, 2006. CCNC 2006. 3rd IEEE , vol.2, no., pp. 1119-1123, 8-10 Jan. 2006
    [5] Pathak, V., Iftode, L.: Byzantine Fault Tolerant Public Key Authentication in Peer-to-Peer Systems. Computer Networks. Special Issues on Management in Peer-to-Peer Systems: Trust, Reputation and Security 50(4), 579–596 (2006)
    [6] Palomar, E., Estevez-Tapiador, J.M., Hernandez-Castro, J.C., Ribagorda, A. Certificate based Access Control in Pure P2P Networks. In: Proceedings of the Sixth IEEE International Conference on Peer-to-Peer Computing, pp. 177–184 (2006)
    [7] Iwata, T.; Abe, T.; Ueda, K.; Sunaga, H., A DRM system suitable for P2P content delivery and the study on its implementation, Proceeding of the 9th Asia-Pacific Conference on Communications (APCC 2003), September 21-24, 2003, Vol. 2, pp. 806-811.
    [8] Reti, T., Sarvas, R.,“DiMaS: distributing multimedia on peer-to-peer file sharing networks”, Proceedings of the 12th annual ACM international conference on Multimedia, October 10-16, 2004, pp166-167.
    [9] A. Shamir, "How to Share a Secret", Communications of ACM, vol. 24, no. 11, 1979, pp.612– 613.
    [10] Guofei Gu, Bin B. Zhu, et.la, PLI: A New Framework to Protect Digital Content for P2P Networks. ACNS, pp.206-216, 2003.
    [11] Chu, C.C.; Su, X.; Prabhu, B.S.; Gadh, R.; Kurup, S.; Sridhar, G.; Sridhar, V., Mobile DRM for multimedia content commerce in P2P networks. Consumer Communications andNetworking Conference, 2006. CCNC 2006. 3rd IEEE , vol.2, no., pp. 1119-1123, 8-10 Jan. 2006
    [12] Pestoni, F., Lotspiech, J.B., Nusser, S.: xCP: Peer-to-Peer Content Protection. IEEE Signal Processing Magazine 21(2), 71–81 (2004)
    [13] 17. Zhou, Y.C., Cerruti, J.A., Ma, L., Ma, L., Myles, G.: CPWCT: Making P2P Home Network Secure Virtual Multimedia Device. In: Proceedings of the IEEE Conference on Local Computer Networks 30th Anniversary (2005)
    [14] Fiat, A., Naor, M.: Broadcast Encryption. In: Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology, pp. 480–491 (August 1994)
    [15] Yao Zhang, Chun Yuan, Yuzhuo Zhong. Implementing DRM over Peer-to-Peer Networks with Broadcast Encryption. Advances in Multimedia Information Processing– PCM 2007, pp. 236-245
    [16] Zhou L, Haas Z J. Securing Ad hoc networks. IEEE Network, 1999, 13(6): 24-30.
    [17] Luo H Y, Lu S W. Ubiquitous and robust authentication services for Ad hoc wireless networks. Technical Report TR-200030, Dept.of Computer Science, UCLA. 2000.
    [18] Lamport L, Shostak R, Pease M. The Byzantine generals problem. ACM Trans. on Programming Languages and Systems, 1982, 4(3):382-401.
    [19] Dolev D, Strong H R. Authenticated algorithms for Byzantine agreement. SIAM Journal of Computation, 1983, 12(4): 656-666.
    [20] Dolev D, Reischuk R, Strong H R. Early stoping in Byzantine agreement. Journal of the ACM, 1990, 37(4): 720-741.
    [21] Siu Hin-Sing, Chin Yeh-Hao, Yang Wei-Pang. Byzantine agreement in the presence of mixed faults on processors and links. IEEE Trans. on Parallel and Distributed Systems, 1998, 9(4):335-345.
    [22] Galil Z, Mayer A, Yung Moti. Resolving message complexity of Byzantine agreement and beyond. 36th Annual Symposium on Foundations of Computer Science, 1995: 724-733.
    [23] Burmester M, Desmedt Y G. Secure communication in an unknown network with Byzantine faults. Electronics Letters, 1998, 34(8): 741-742.
    [24] Wang S C, Yang W P, Cheng C F. Byzantine agreement on mobile Ad-hoc network. IEEE International Conference on Networking, Sensing and Control, 2004, vol.1: 52-57.
    [25] Bergano M R, et al.. System design specification for mobile multimedia wireless network (MMWN) (draft), DARPA project DAAB07-95-C-D156, Oct.1996.
    [26] Atsushi Iwata, Ching C C, Pei, G Y, Gerla M, Chen T W. Scalable routing strategies for Ad hoc wireless networks. IEEE Journal on Selected Areas in Communications, 1999, 17(8): 1369-1379.
    [27] Poosarla R, Deng Hongmei, Ojha A, Agrawal D P. A cluster based secure routing scheme for wireless Ad hoc networks. IEEE International Conference on Performance, Computing, and Communications, 2004: 171-175.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700