English  |  正體中文  |  简体中文  |  Items with full text/Total items : 52052/87180 (60%)
Visitors : 8893850      Online Users : 104
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/94275

    Title: 跨平台具不可追蹤性之家庭數位版權協定之研究
    Other Titles: Study of untraceability and cross-platform protocol in home-scoped digital rights management
    Authors: 劉盈妤;Liu, Ying-Yu
    Contributors: 淡江大學資訊管理學系碩士班
    李鴻璋;Lee, Hung-Chang
    Keywords: 跨平台;不可追蹤性;家庭數位版權;密碼學;數位內容;Cross-platform;untraceability;Home-scoped Digital Rights;Cryptography;digital content
    Date: 2013
    Issue Date: 2014-01-23 14:14:48 (UTC+8)
    Abstract: 目前商業上提供的平台皆屬於封閉型的系統,不過隨著智慧型手機與平板電腦的普及,消費者偏好在多種平台中使用相同的軟體,跨平台分享將是未來的趨勢主流,在不久的將來跨平台分享數位內容也將建立在家庭當中,引領全球進入嶄新的數位家庭時代。所以如何透過有效的方式來保護數位內容防止非法行為,並提高其安全性將是這個階段所需重視的課題。
    Commercially offering platforms are belong to Closed-End system at present, but with the popularization of smartphones and Tablet PCs,the consumers prefer using the same software in multiple platforms, cross-platform sharing will be a mainstream in the future, in the near future, cross-platform sharing of digital content will also be established within the family, leading the world into a new digital home era. So ,how to go through effective way to protect digital content to prevent illegal activities and improve security will be an important issue at this stage.

    In previous related study, the proposed protocol are only improve the problem on file transfering of Closed-End, mainly in the recognition of digital right trading mechanism, but didn’t consider security.Therefore, we propose CUHO protocol, in addition to the digital rights to share the purpose, taking into account signaling the importance of safety, the use of cryptography on a challenge-response combined with hash lock method,each round communications authentication information added random number and the timestamp for the computing our scheme also supports untraceability and to avoid replay attacks to increase security.
    Appears in Collections:[資訊管理學系暨研究所] 學位論文

    Files in This Item:

    File SizeFormat

    All items in 機構典藏 are protected by copyright, with all rights reserved.

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback