Digital Library


Search: "[ keyword: DRM ]" (15)
    Effective Domestic e-Discovery Procedures
    Shin-Hyung Lee, Sangjin Lee, Vol. 26, No. 5, pp. 1171-1184, Oct. 2016
    10.13089/JKIISC.2016.26.5.1171
    Keywords: E-Discovery, EDRM, Litigation Readiness, Computer Forensics, Enterprise DRM, Groupware

    The Proactive Threat Protection Method from Predicting Resignation Throughout DRM Log Analysis and Monitor
    Miboon Hyun, Sangjin Lee, Vol. 26, No. 2, pp. 369-376, Apr. 2016
    10.13089/JKIISC.2016.26.2.369
    Keywords: DRM, log analysis, Outlier Detection, prediction, Monitoring Process, Proactive Threat Detection

    Study on Detection Technique of Privacy Distribution Route based on Interconnection of Security Documents and Transaction ID
    Jae-ho Shin, In-seok Kim, Vol. 25, No. 6, pp. 1435-1448, Dec. 2015
    10.13089/JKIISC.2015.25.6.1435
    Keywords: Personal Information, DRM, Distribution channel, Systematic chains, Life-Cycle management

    E-DRM-based Privacy Protection Technology for Overcoming Technical Limitations of DLP-based Solutions
    Jong-Uk Choi, Yong-Jin Lee, Ju-Mi Park, Vol. 22, No. 5, pp. 1103-1114, Oct. 2012
    10.13089/JKIISC.2012.22.5.1103
    Keywords: PPS, DLP, E-DRM, Contents Filtering, APT, Privacy

    A Study on Contents Sharing Mechanism based on Proxy Re-Encryption Scheme using the Smart Card
    Seung-Hwan Park, Woo-Kwon Koo, Ki-Tak Kim, Hye-Ran Mun, Dong-Hoon Lee, Vol. 21, No. 3, pp. 131-142, Jun. 2011
    10.13089/JKIISC.2011.21.3.131
    Keywords: DRM, OMA-DRM, Proxy re-encryption

    Domain Key Based Efficient Redistribution Mechanism of Scalable Contents
    Su-Wan Park, Sang-Uk Shin, Vol. 20, No. 1, pp. 129-134, Feb. 2010
    10.13089/JKIISC.2010.20.1.129
    Keywords: DRM, SVC, authorized domain, content redistribution

    Design and Implementation of Efficient DRM System for Contents Streaming based on H.264
    Yoon-Hyun Jung, Soo-Hyun Oh, Vol. 19, No. 2, pp. 155-164, Apr. 2009
    10.13089/JKIISC.2009.19.2.155
    Keywords: DRM, Streaming, H.264

    A Proposal for Digital Forensic Model for Secure Digital Rights Management
    Ui-Jin Jang, Byung-Ok Jung, Hyung-Min Lim, Yong-Tae Shin, Vol. 18, No. 6, pp. 185-198, Oct. 2008
    10.13089/JKIISC.2008.18.6.185
    Keywords: digital forensic, DRM, Ubiquitous home

    Design and Implementation of Secure Distribution System for Broadcasting Contents
    Jin-Heung Lee, Hea-Ju Lee, Sang-Uk Shin, Vol. 17, No. 2, pp. 19-28, Apr. 2007
    10.13089/JKIISC.2007.17.2.19
    Keywords: MPEC-2 TS security, Broadcasting key distribution, DRM, CTR mode, copyright protection for HDTV

    A Secure License Sharing Scheme for Domain DRM System Against Replay Attack
    Dong-Hyun Choi, Yun-Ho Lee, Ho-Gab Kang, Seung-Joo Kim, Dong-Ho Won, Vol. 17, No. 1, pp. 97-102, Feb. 2007
    10.13089/JKIISC.2007.17.1.97
    Keywords: DRM, Home Networks