Author of the publication

Secure and Flexible Digital Rights Management in a Pervasive Usage Mode.

, , and . CIS, page 863-867. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Anonymous Communication with Conditional Traceability., , , , and . NPC, volume 3779 of Lecture Notes in Computer Science, page 405-408. Springer, (2005)TrustedBaaS: Blockchain-Enabled Distributed and Higher-Level Trusted Platform., , , and . Comput. Networks, (2020)DBSDS: A dual-blockchain security data sharing model with supervision and privacy-protection., , , , , and . Concurr. Comput. Pract. Exp., (2023)Secure and Flexible Digital Rights Management in a Pervasive Usage Mode., , and . CIS, page 863-867. IEEE Computer Society, (2007)Secure Multimedia Streaming with Trusted Digital Rights Management., , and . LCN, page 817-821. IEEE Computer Society, (2005)Adaptive Load Balancing and Fault Tolerance in Push-Based Information Delivery Middleware Service., and . WAIM, volume 3129 of Lecture Notes in Computer Science, page 733-738. Springer, (2004)Kernel-Based Semantic Text Categorization for Large Scale Web Information Organization., , and . GCC, volume 3251 of Lecture Notes in Computer Science, page 389-396. Springer, (2004)Keyless Entry Security System based on Gait Context., , , and . DSA, page 865-869. IEEE, (2022)Support Vector Machines Learning for Web-Based Adaptive and Active Information Retrieval., and . APWeb, volume 3007 of Lecture Notes in Computer Science, page 89-99. Springer, (2004)Verifiable Threshold Authorization for Scalable and Secure Digital Rights Management., , , and . J. Softw., 8 (6): 1526-1535 (2013)