Design of User Authentication and DRM Security System Using Security Agent


The KIPS Transactions:PartC, Vol. 12, No. 7, pp. 973-980, Dec. 2005
10.3745/KIPSTC.2005.12.7.973,   PDF Download:

Abstract

This paper proposes the more various key generation algoruthms than existing method and the DRM encryption system supporting the higher security than the existing systems which do not store a symmetric key made by the key generation algorithm in a server. Also, we propose a client security agent system which decrypts a data by analogized key. We designed and implemented the proposed system. And, we tested the video data files with the various size to evaluate the performance of our system. Our experiment results show that the delay time includes an encryption and decryption time was significantly reduced through our proposed scheme.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
J. J. Kim, K. S. Lee, M. S. Jun, "Design of User Authentication and DRM Security System Using Security Agent," The KIPS Transactions:PartC, vol. 12, no. 7, pp. 973-980, 2005. DOI: 10.3745/KIPSTC.2005.12.7.973.

[ACM Style]
Jung Jae Kim, Kyung Seog Lee, and Moon Seog Jun. 2005. Design of User Authentication and DRM Security System Using Security Agent. The KIPS Transactions:PartC, 12, 7, (2005), 973-980. DOI: 10.3745/KIPSTC.2005.12.7.973.