Gelişmiş Arama

Basit öğe kaydını göster

dc.contributor.authorHussain, Sajid
dc.contributor.authorBin Zikria, Yousaf
dc.contributor.authorMallah, Ghulam Ali
dc.contributor.authorChen, Chien-Ming
dc.contributor.authorAlshehri, Mohammad Dahman
dc.contributor.authorIshmanov, Farruh
dc.contributor.authorChaudhry, Shehzad Ashraf
dc.date.accessioned2023-10-06T07:39:04Z
dc.date.available2023-10-06T07:39:04Z
dc.date.issued2022en_US
dc.identifier.issn1530-8669
dc.identifier.issn1530-8677
dc.identifier.urihttps://hdl.handle.net/11363/5778
dc.description.abstractWith the increasing number and popularity of digital content, the management of digital access rights has become an utmost important field. Through digital rights management systems (DRM-S), access to digital contents can be defined and for this, an efficient and secure authentication scheme is required. The DRM authentication schemes can be used to give access or restrict access to digital content. Very recently in 2020, Yu et al. proposed a symmetric hash and xor-based DRM and termed their system to achieve both security and performance efficiency. Contrarily, in this study, we argue that their scheme has several issues including nonresistance to privileged insider and impersonation attacks. Moreover, it is also to show in this study that their scheme has an incorrect authentication phase and due to this incorrectness, the scheme of Yu et al. lacks user scalability. An improved scheme is then proposed to counter the insecurities and incorrectness of the scheme of Yu et al. We prove the security of the proposed scheme using BAN logic. For a clear picture of the security properties, we also provide a textual discussion on the robustness of the proposed scheme. Moreover, due to the usage of symmetric key-based hash functions, the proposed scheme has a comparable performance efficiency.en_US
dc.language.isoengen_US
dc.publisherWILEY-HINDAWI, ADAM HOUSE, 3RD FL, 1 FITZROY SQ, LONDON WIT 5HE, ENGLANDen_US
dc.relation.isversionof10.1155/2022/1041880en_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.rightsAttribution-NonCommercial-NoDerivs 3.0 United States*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/us/*
dc.titleAn Improved Authentication Scheme for Digital Rights Management Systemen_US
dc.typearticleen_US
dc.relation.ispartofWireless Communications and Mobile Computingen_US
dc.departmentMühendislik ve Mimarlık Fakültesien_US
dc.authoridhttps://orcid.org/0000-0003-1540-4940en_US
dc.authoridhttps://orcid.org/0000-0002-6570-5306en_US
dc.authoridhttps://orcid.org/0000-0003-3428-9802en_US
dc.authoridhttps://orcid.org/0000-0002-6502-472Xen_US
dc.authoridhttps://orcid.org/0000-0001-9520-330Xen_US
dc.authoridhttps://orcid.org/0000-0002-7378-8009en_US
dc.authoridhttps://orcid.org/0000-0002-9321-6956en_US
dc.identifier.volume2022en_US
dc.identifier.startpage1en_US
dc.identifier.endpage11en_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.institutionauthorChaudhry, Shehzad Ashraf


Bu öğenin dosyaları:

Thumbnail

Bu öğe aşağıdaki koleksiyon(lar)da görünmektedir.

Basit öğe kaydını göster

info:eu-repo/semantics/openAccess
Aksi belirtilmediği sürece bu öğenin lisansı: info:eu-repo/semantics/openAccess