Work place: State Key Laboratory of Information Security, Institute of Software Chinese Academy of Sciences, Beijing, China
E-mail: qin_yu@is.iscas.ac.cn
Website:
Research Interests: Computer Architecture and Organization, Information Security, Network Security, Data Structures and Algorithms
Biography
Yu Qin. born in 1979. PhD Information Security(Graduate University of Chinese Academy of Sciences. China. 2009). He has worked in State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, China. (Research Associate). He is interested in network and system security, trusted computing.
By Hao Li Yu Qin Qianying Zhang Shijun Zhao
DOI: https://doi.org/10.5815/ijwmt.2012.04.01, Pub. Date: 15 Aug. 2012
We present a novel solution that allows one platform to securely distribute or redistribute digital contents to another in P2P networks. The solution is based on platforms with Trusted Platform Modules (TPMs). It maintains the confidentiality and freshness of digital contents during the processes of distribution. Given an ideal (tamper-proof) trusted platform, the solution can even withstand attacks by dishonest users during the processes of usage. Moreover, it can also be used to redistribute n-time-use digital content offline, so it is more flexible and scalable than other related distribution solutions to enable widespread deployment. Lastly, by adding a few simple features to TPMs, our solution can easily prevent the malicious sender and receiver from colluding when the redistribution takes place, so we can ensure that they can not gain more than a previously defined amount of rights without contacting the content provider.
[...] Read more.By Hao Li Yu Qin Qianying Zhang Shijun Zhao
DOI: https://doi.org/10.5815/ijcnis.2011.02.04, Pub. Date: 8 Mar. 2011
We present a novel solution that allows one platform to securely distribute or redistribute digital contents to another in P2P networks. The solution includes three protocols (distribution protocol, usage protocol, redistribution protocol) which are all based on platforms with Trusted Platform Modules (TPMs). It maintains the confidentiality and freshness of digital contents during the processes of distribution. Given an ideal (tamper-proof) trusted platform, the solution can even withstand attacks by dishonest users during the processes of usage. Moreover, it can also be used to redistribute n-time-use digital content offline, so it is more flexible and scalable than other related distribution solutions to enable widespread deployment. Lastly, by adding a few simple features to TPMs, our solution can easily prevent the malicious sender and receiver from colluding when the redistribution takes place, so we can ensure that they can not gain more than a previously defined amount of rights without contacting the content provider.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals