A License Audit Model for Secure DRM Systems in IP-based Environments
Ui Jin Jang, Hyung-Min Lim, Yong-Tae Shin, Journal of Information Processing Systems Vol. 6, No. 2, pp. 253-260, Jun. 2010
https://doi.org/10.3745/JIPS.2010.6.2.253
Keywords: digital forensic, DRM, IP-Based Network
Fulltext:
Abstract
Statistics
Show / Hide Statistics
Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
|
Cite this article
[APA Style]
Jang, U., Lim, H., & Shin, Y. (2010). A License Audit Model for Secure DRM Systems in IP-based Environments. Journal of Information Processing Systems, 6(2), 253-260. DOI: 10.3745/JIPS.2010.6.2.253.
[IEEE Style]
U. J. Jang, H. Lim, Y. Shin, "A License Audit Model for Secure DRM Systems in IP-based Environments," Journal of Information Processing Systems, vol. 6, no. 2, pp. 253-260, 2010. DOI: 10.3745/JIPS.2010.6.2.253.
[ACM Style]
Ui Jin Jang, Hyung-Min Lim, and Yong-Tae Shin. 2010. A License Audit Model for Secure DRM Systems in IP-based Environments. Journal of Information Processing Systems, 6, 2, (2010), 253-260. DOI: 10.3745/JIPS.2010.6.2.253.