[1] 马兆丰, 范科峰, 陈铭, 等. 支持时空约束的可信数字版权管理安全许可协议[J]. 通信学报, 2008, 29(10): 153-164. Ma Zhaofeng, Fan Kefeng, Chen Ming, et al. Trusted digital rights management protocol supporting for time and space constraint[J]. Journal on Communications, 2008, 29(10): 153-164.[2] Wang Chaokun, Zou Peng, Liu Zhang, et al. CS-DRM: a cloud-based SIM DRM scheme for mobile internet[J]. Eurasip Journal on Wireless Communications and Networking, 2011(1): 1-30.[3] Blaze M, Bleumer G, Strauss M. Divertible protocols and atomic proxy cryptography[C]//Advances in Cryptology-EUROCRYPT1998, International Conference on the Theory and Application of Cryptographic Techniques. Espoo: LNCS 1403, 1998: 127-144.[4] Ateniese G, Fu K, Green M, et al. Improved proxy re-encryption schemes with applications to secure distributed storage[J]. ACM Transactions on Information and System Security, 2006, 9(1): 1-30.[5] Taban G, Cárdenas A A, Gligor V D. Towards a secure and interoperable DRM architecture[C]//Proceedings of the 6th ACM Workshop on Digital Rights Management. New York: ACM Press, 2006: 69-78.[6] Lee S, Park H, Kim J. A secure and mutual-profitable DRM interoperability scheme[C]//ISCC 2010. New York: IEEE Inc, 2010: 75-80.[7] Ma Guojun, Pei Qingqi, Wang Yuchen. A general sharing model based on proxy re-encryption[C]//ⅡHMSP 2011. Piscataway: IEEE Computer Society, 2011: 248-251.[8] Petrlic R, Sorge C. Privacy-preserving DRM for cloud computing[C]//WAINA 2012. Piscataway: IEEE Computer Society, 2012: 1286-1291. |