A License Audit Model for Secure DRM Systems in IP-based Environments
Ui Jin Jang, Hyung-Min Lim, Yong-Tae Shin, Journal of Information Processing Systems Vol. 6, No. 2, pp. 253-260, Jun. 2010
Keywords: digital forensic, DRM, IP-Based Network
Fulltext:
Abstract
Statistics
Show / Hide Statistics
Statistics (Past 3 Years)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
Statistics (Past 3 Years)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
|
|
Cite this article
[APA Style]
Jang, U., Lim, H., & Shin, Y. (2010). A License Audit Model for Secure DRM Systems in IP-based Environments. Journal of Information Processing Systems, 6(2), 253-260. DOI: 10.3745/JIPS.2010.6.2.253.
[IEEE Style]
U. J. Jang, H. Lim, Y. Shin, "A License Audit Model for Secure DRM Systems in IP-based Environments," Journal of Information Processing Systems, vol. 6, no. 2, pp. 253-260, 2010. DOI: 10.3745/JIPS.2010.6.2.253.
[ACM Style]
Ui Jin Jang, Hyung-Min Lim, and Yong-Tae Shin. 2010. A License Audit Model for Secure DRM Systems in IP-based Environments. Journal of Information Processing Systems, 6, 2, (2010), 253-260. DOI: 10.3745/JIPS.2010.6.2.253.