{"title":"Unlinkable content playbacks in a multiparty DRM system","date_updated":"2022-01-06T07:01:19Z","ddc":["040"],"date_created":"2017-10-17T12:42:24Z","type":"conference","user_id":"15504","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt C1","_id":"13"},{"_id":"4","name":"SFB 901 - Project Area C"}],"has_accepted_license":"1","_id":"473","file_date_updated":"2018-03-16T11:17:30Z","series_title":"Lecture Notes in Computer Science","year":"2013","citation":{"apa":"Petrlic, R., & Sekula, S. (2013). Unlinkable content playbacks in a multiparty DRM system. In L. Wang & B. Shafiq (Eds.), Data and Applications Security and Privacy XXVII (pp. 289–296). https://doi.org/10.1007/978-3-642-39256-6_21","ama":"Petrlic R, Sekula S. Unlinkable content playbacks in a multiparty DRM system. In: Wang L, Shafiq B, eds. Data and Applications Security and Privacy XXVII. Lecture Notes in Computer Science. ; 2013:289-296. doi:10.1007/978-3-642-39256-6_21","mla":"Petrlic, Ronald, and Stephan Sekula. “Unlinkable Content Playbacks in a Multiparty DRM System.” Data and Applications Security and Privacy XXVII, edited by Lingyu Wang and Basit Shafiq, 2013, pp. 289–96, doi:10.1007/978-3-642-39256-6_21.","bibtex":"@inproceedings{Petrlic_Sekula_2013, series={Lecture Notes in Computer Science}, title={Unlinkable content playbacks in a multiparty DRM system}, DOI={10.1007/978-3-642-39256-6_21}, booktitle={Data and Applications Security and Privacy XXVII}, author={Petrlic, Ronald and Sekula, Stephan}, editor={Wang, Lingyu and Shafiq, BasitEditors}, year={2013}, pages={289–296}, collection={Lecture Notes in Computer Science} }","ieee":"R. Petrlic and S. Sekula, “Unlinkable content playbacks in a multiparty DRM system,” in Data and Applications Security and Privacy XXVII, 2013, pp. 289–296.","short":"R. Petrlic, S. Sekula, in: L. Wang, B. Shafiq (Eds.), Data and Applications Security and Privacy XXVII, 2013, pp. 289–296.","chicago":"Petrlic, Ronald, and Stephan Sekula. “Unlinkable Content Playbacks in a Multiparty DRM System.” In Data and Applications Security and Privacy XXVII, edited by Lingyu Wang and Basit Shafiq, 289–96. Lecture Notes in Computer Science, 2013. https://doi.org/10.1007/978-3-642-39256-6_21."},"status":"public","file":[{"success":1,"file_id":"1330","relation":"main_file","content_type":"application/pdf","file_name":"473-drm-general-1-camera-ready.pdf","file_size":286049,"creator":"florida","date_updated":"2018-03-16T11:17:30Z","date_created":"2018-03-16T11:17:30Z","access_level":"closed"}],"doi":"10.1007/978-3-642-39256-6_21","editor":[{"first_name":"Lingyu","last_name":"Wang","full_name":"Wang, Lingyu"},{"first_name":"Basit","full_name":"Shafiq, Basit","last_name":"Shafiq"}],"author":[{"first_name":"Ronald","full_name":"Petrlic, Ronald","last_name":"Petrlic"},{"last_name":"Sekula","full_name":"Sekula, Stephan","first_name":"Stephan"}],"publication":"Data and Applications Security and Privacy XXVII","page":"289-296","abstract":[{"text":"We present a solution to the problem of privacy invasion in a multiparty digital rights management scheme. (Roaming) users buy content licenses from a content provider and execute it at any nearby content distributor. Our approach, which does not need any trusted third party - in contrast to most related work on privacy-preserving DRM - is based on a re-encryption scheme that runs on any mobile Android device. Only a minor security-critical part needs to be performed on the device's smartcard which could, for instance, be a SIM card.","lang":"eng"}]}