B. C. Popescu, B. Crispo, A. S. Tanenbaum, and F. Kamperman, A DRM security architecture for home networks, Proceedings of the 4th ACM workshop on Digital rights management , DRM '04, pp.1-10, 2004.
DOI : 10.1145/1029146.1029150

G. Ma, Q. Pei, X. Jiang, and Y. Wang, A proxy re-encryption based sharing model for drm, Int'l J. of Digital Content Tech. and its Applications, vol.5, issue.11, p.385, 2011.

G. Ateniese, K. Fu, M. Green, and S. Hohenberger, Improved proxy re-encryption schemes with applications to secure distributed storage, ACM Transactions on Information and System Security, vol.9, issue.1, pp.1-30, 2006.
DOI : 10.1145/1127345.1127346

I. M. Abbadi, Digital Rights Management Using a Master Control Device, In: ASIAN, pp.126-141, 2007.
DOI : 10.1007/978-3-540-76929-3_13

N. P. Sheppard and R. Safavi-naini, Sharing digital rights with domain licensing, Proceedings of the 4th ACM international workshop on Contents protection and security , MCPS '06, pp.3-12, 2006.
DOI : 10.1145/1178766.1178769

A. R. Sadeghi, M. Wolf, C. Stüble, N. Asokan, and J. E. Ekberg, Enabling Fairer Digital Rights Management with Trusted Computing, In: ISC, pp.53-70, 2007.
DOI : 10.1007/978-3-540-75496-1_4

S. Lee, J. Kim, and S. J. Hong, Redistributing time-based rights between consumer devices for content sharing in DRM system, International Journal of Information Security, vol.21, issue.2, pp.263-273, 2009.
DOI : 10.1007/s10207-009-0082-5

S. D. Galbraith, K. Harrison, and D. Soldera, Implementing the Tate Pairing, In: ANTS, pp.324-337, 2002.
DOI : 10.1007/3-540-45455-1_26