淡江大學機構典藏:Item 987654321/94275
English  |  正體中文  |  简体中文  |  全文笔数/总笔数 : 62805/95882 (66%)
造访人次 : 3931577      在线人数 : 464
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻


    jsp.display-item.identifier=請使用永久網址來引用或連結此文件: https://tkuir.lib.tku.edu.tw/dspace/handle/987654321/94275


    题名: 跨平台具不可追蹤性之家庭數位版權協定之研究
    其它题名: Study of untraceability and cross-platform protocol in home-scoped digital rights management
    作者: 劉盈妤;Liu, Ying-Yu
    贡献者: 淡江大學資訊管理學系碩士班
    李鴻璋;Lee, Hung-Chang
    关键词: 跨平台;不可追蹤性;家庭數位版權;密碼學;數位內容;Cross-platform;untraceability;Home-scoped Digital Rights;Cryptography;digital content
    日期: 2013
    上传时间: 2014-01-23 14:14:48 (UTC+8)
    摘要: 目前商業上提供的平台皆屬於封閉型的系統,不過隨著智慧型手機與平板電腦的普及,消費者偏好在多種平台中使用相同的軟體,跨平台分享將是未來的趨勢主流,在不久的將來跨平台分享數位內容也將建立在家庭當中,引領全球進入嶄新的數位家庭時代。所以如何透過有效的方式來保護數位內容防止非法行為,並提高其安全性將是這個階段所需重視的課題。
    之前相關研究中,所提出之協定皆只有改善封閉式檔案傳輸的問題,其主要是在確認數位版權的交易機制,不過並沒有做到安全上的考量。因此在我們所提出的CUHO協定,除了數位版權分享的目的,並考慮到訊息傳遞安全的重要性,利用了密碼學上的挑戰回應並結合隨機雜湊鎖之理念,將每回合通訊之認證資訊加入隨機亂數以及時間戳記作運算,以達到不可追蹤性以及避免重送攻擊來提高安全性。
    Commercially offering platforms are belong to Closed-End system at present, but with the popularization of smartphones and Tablet PCs,the consumers prefer using the same software in multiple platforms, cross-platform sharing will be a mainstream in the future, in the near future, cross-platform sharing of digital content will also be established within the family, leading the world into a new digital home era. So ,how to go through effective way to protect digital content to prevent illegal activities and improve security will be an important issue at this stage.

    In previous related study, the proposed protocol are only improve the problem on file transfering of Closed-End, mainly in the recognition of digital right trading mechanism, but didn’t consider security.Therefore, we propose CUHO protocol, in addition to the digital rights to share the purpose, taking into account signaling the importance of safety, the use of cryptography on a challenge-response combined with hash lock method,each round communications authentication information added random number and the timestamp for the computing our scheme also supports untraceability and to avoid replay attacks to increase security.
    显示于类别:[資訊管理學系暨研究所] 學位論文

    文件中的档案:

    档案 大小格式浏览次数
    index.html0KbHTML215检视/开启

    在機構典藏中所有的数据项都受到原著作权保护.

    TAIR相关文章

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - 回馈