• 沒有找到結果。

[PDF] Top 20 IP-Based DRM - A Fair and Privacy Preserving DRM Framework

Has 10000 "IP-Based DRM - A Fair and Privacy Preserving DRM Framework" found on our website. Below are the top 20 most common "IP-Based DRM - A Fair and Privacy Preserving DRM Framework".

IP-Based DRM - A Fair and Privacy Preserving DRM Framework

IP-Based DRM - A Fair and Privacy Preserving DRM Framework

... content and the licenses, etc. As far as we know, Device-based systems generally impulse more constraints on the usage of ...While IP-based is ready to implement many user friendly functions ... See full document

8

Unifying Semantic Privacy Protection Web Policies for Digital Rights Management (DRM) System

Unifying Semantic Privacy Protection Web Policies for Digital Rights Management (DRM) System

... for privacy data protection and ODRL/XrML is used for digital rights control in the digital rights management (DRM) ...as a software program to process them ...ontologies and/or rules ... See full document

20

Efficient and Portable Digital Rights Management for Preserving User Privacy Using Smart Cards

Efficient and Portable Digital Rights Management for Preserving User Privacy Using Smart Cards

... is a mechanism used to control the use of digital con- tent according to the usage rules specified in the ...accesses, DRM systems would bind the unique hardware ID to the ...device, and is uneasy ... See full document

10

Pricing schemes for digital content with DRM mechanisms

Pricing schemes for digital content with DRM mechanisms

... of DRM technology strengthens as the content and platform are offered by completely independent ...have a collaborative relationship, the providers tend to use less DRM protection on their ... See full document

12

Privacy-Preserving Compressive Sensing for Crowdsensing based Trajectory Recovery

Privacy-Preserving Compressive Sensing for Crowdsensing based Trajectory Recovery

... Abstract—Location based services have experienced an explo- sive growth and evolved from utilizing a single location to the whole ...hardware and energy constraints, there are usually many ... See full document

10

SPRING: A Strategy-Proof and Privacy Preserving Spectrum Auction Mechanism

SPRING: A Strategy-Proof and Privacy Preserving Spectrum Auction Mechanism

... problem. A great number of strategy-proof auction mechanisms have been proposed to improve spectrum allocation efficiency by stimu- lating bidders to truthfully reveal their valuations of spectrum, which are the ... See full document

9

A Decision Tree Based Quasi-Identifier Perturbation Technique for Preserving Privacy in Data Mining

A Decision Tree Based Quasi-Identifier Perturbation Technique for Preserving Privacy in Data Mining

... Algorithm EPLP2 can increase the number of tuples that can be perturbed in each step, and thus can maintain the structure of decision tree, and this Algorithm can balance the flexibility[r] ... See full document

10

POLA: A Privacy-Preserving Protocol for Location-Based Real-Time Advertising

POLA: A Privacy-Preserving Protocol for Location-Based Real-Time Advertising

... of privacy, two deficiencies are found in current ...introduce a trusted third party to help them anonymize the users’ ...of a trusted third party is questionable, since it is usually costly ... See full document

8

A General Privacy Preserving Auction Mechanism for Secondary Spectrum Markets

A General Privacy Preserving Auction Mechanism for Secondary Spectrum Markets

... as a research fellow, and University of Queensland, Australia in 2000 as a visiting Profes- ...was a visiting Professor in Wayne State University. He is a Distinguished Professor ... See full document

13

Privacy and Quality Preserving Multimedia Data Aggregation for Participatory Sensing Systems

Privacy and Quality Preserving Multimedia Data Aggregation for Participatory Sensing Systems

... MCT-PRO, and Simple Exchanging) to achieve a targeted reconstruction ratio of ...10/21, and 10/26, when the loss probability is ...EXP and MCT-PRO may not be met in some ... See full document

14

Privacy Preserving Data Modeling: An Overview

Privacy Preserving Data Modeling: An Overview

... where |X| is the number of items in X, l 2 is the maximum number of large 2- itemsets, and K is the maximum number of iterations in DSC algorithm. SWA is O((n 1 -1)*n 1 /2*|D|*Kw) where n 1 is the initial number ... See full document

79

PAACP: A portable privacy-preserving authentication and access control protocol in vehicular ad hoc networks

PAACP: A portable privacy-preserving authentication and access control protocol in vehicular ad hoc networks

... i and SK S i . The former is used for non-interactive ID-based public key, and the lat- ter is used for signing and decrypting the messages sent from vehi- cles or ...adopted a ... See full document

10

應用Partial DRM於DICOM醫療資訊之版權管理方法

應用Partial DRM於DICOM醫療資訊之版權管理方法

... 1.我們將加密的部份,採用自訂欄位的方式(可參照 3.5.1 節說明),讓一般播放軟體 能夠正常取得,並視之為其他二進制資料,進而繼續 Parsing 其餘資料,不會造成解讀 的困擾。 2. 我們將 DICOM 的 Data Element 轉換成 3.5.1 節所描述的結構,加密時,由於被 加密的資料長度會改變(變成 128 bit 的倍數,因為我們使用 AES 128bits 加密的關係,若 使用 AES 256bits,則為 ... See full document

58

DICOM醫療資訊應用Partial DRM 於雲端科技環境

DICOM醫療資訊應用Partial DRM 於雲端科技環境

... 醫學界也提供使用者網路應用程式。DICOM 是醫療系統的信息交換的標準格式。 在網路上也有許多與 DICOM 有關的應用程式。 快速增長的網際網路引發了安全和隱私問題。數位內容保護成為一個重要課題。 如果數位內容的安全機制沒有做好,會引發未被授權的的使用,存取重要資訊,損害 擁有者的權利。DRM (數位版權管理) 是為了控制、保護、限制數位內容的應用。 ... See full document

50

Service-oriented grid computing system for digital rights management (GC-DRM)

Service-oriented grid computing system for digital rights management (GC-DRM)

... is a phrase in distributed computing that means multiple independent computing clusters acting like a ‘‘grid” because they are composed of resource nodes not located within a single administrative ... See full document

19

Hiding Constrained Association Rules in Privacy Preserving Data Mining

Hiding Constrained Association Rules in Privacy Preserving Data Mining

... Data Cleaning Data Integration Data Warehouse Task-relevant Data Selection Data Mining Pattern Evaluation... Current Technology: Architecture of a Typical Data Mining System.[r] ... See full document

70

改良分散式DRM 機制控管P2P 即時串流服務

改良分散式DRM 機制控管P2P 即時串流服務

... 引進改良之 DRM 機制,並導入新型金鑰管理系 統。即時串流傳輸架構具有即載即看即丟的特 性,能預防數位內容被重複利用,對於本研究 所改良之 DRM 機制具有加強效果;而導入新型 金鑰管理系統,除了使得內容保護於 P2P 機制 下可行外,也使得 DRM 機制運作時,惟有使用 者缺乏合法解密金鑰時,才會出現警告,其餘 時候使用者並不會感受到 DRM 機制之控管,因 此能提升使用者對於 ... See full document

11

A Fair and Efficient SOM-based Feedback Congestion Control in ATM Networks

A Fair and Efficient SOM-based Feedback Congestion Control in ATM Networks

... BECN and the FECN, queue length of the switch is used for ...predict and prevent the forthcoming ...(UCT) and Lower Congestion Threshold ...load and the heavy ... See full document

6

Sleep Deprivation Produces False Memories in the DRM Paradigm: Event-Related Potential (ERP) Evidence

Sleep Deprivation Produces False Memories in the DRM Paradigm: Event-Related Potential (ERP) Evidence

... - Sleep deprivation may impair the recollection process for memory retrieval. 睡[r] ... See full document

3

A user-attention based focus detection framework and its applications

A user-attention based focus detection framework and its applications

... score from 1 to 5 (larger value means better quality in perception) according to his or her intuition. The subjective results are shown in Table 1. In each category, th[r] ... See full document

5

Show all 10000 documents...