-
1
-
-
84858918037
-
Property-based broadcast encryption for multi-level security policies
-
Horst Görtz Institute for IT Security
-
Adelsbach, A., Huber, U., Sadeghi, A.R.: Property-based broadcast encryption for multi-level security policies. Technical Report, full version of this paper, Horst Görtz Institute for IT Security (2005) http://www.prosec.rub.de/publications.
-
(2005)
Technical Report, Full Version of This Paper
-
-
Adelsbach, A.1
Huber, U.2
Sadeghi, A.R.3
-
2
-
-
7644241281
-
A review of of watermarking principles and practices
-
Parhi, K.K., Nishitani, T., eds.: IEEE
-
Miller, M.L., Cox, I.J., Linnartz, J.P.M.G., Kalker, T.: A review of of watermarking principles and practices. In Parhi, K.K., Nishitani, T., eds.: Digital Signal Processing for Multimedia Systems. IEEE (1999) 461-485
-
(1999)
Digital Signal Processing for Multimedia Systems
, pp. 461-485
-
-
Miller, M.L.1
Cox, I.J.2
Linnartz, J.P.M.G.3
Kalker, T.4
-
3
-
-
64949151681
-
Digital watermarking
-
Becker, E., Buhse, W., Günnewig, D., Rump, N., eds.: Digital Rights Management: Technological, Economic, Legal and Political Aspects. Springer
-
Petitcolas, F.A.: Digital watermarking. In Becker, E., Buhse, W., Günnewig, D., Rump, N., eds.: Digital Rights Management: Technological, Economic, Legal and Political Aspects. Volume 2770 of Lecture Notes in Computer Science., Springer (2003) 81-92
-
(2003)
Lecture Notes in Computer Science
, vol.2770
, pp. 81-92
-
-
Petitcolas, F.A.1
-
4
-
-
11144253373
-
Video fingerprinting and encryption principles for digital rights management
-
Kundur, D., Karthik, K.: Video fingerprinting and encryption principles for digital rights management. Proceedings of the IEEE 92(6) (2004) 918-932
-
(2004)
Proceedings of the IEEE
, vol.92
, Issue.6
, pp. 918-932
-
-
Kundur, D.1
Karthik, K.2
-
5
-
-
84985922619
-
Tracing traitors
-
Desmedt, Y., ed.: CRYPTO 1994. Springer
-
Chor, B., Fiat, A., Naor, M.: Tracing traitors. In Desmedt, Y., ed.: CRYPTO 1994. Volume 839 of Lecture Notes in Computer Science., Springer (1994) 257-270
-
(1994)
Lecture Notes in Computer Science
, vol.839
, pp. 257-270
-
-
Chor, B.1
Fiat, A.2
Naor, M.3
-
6
-
-
84957617696
-
Threshold traitor tracing
-
Krawczyk, H., ed.: CRYPTO 1998. Springer
-
Naor, M., Pinkas, B.: Threshold traitor tracing. In Krawczyk, H., ed.: CRYPTO 1998. Volume 1462 of Lecture Notes in Computer Science., Springer (1998) 502-517
-
(1998)
Lecture Notes in Computer Science
, vol.1462
, pp. 502-517
-
-
Naor, M.1
Pinkas, B.2
-
7
-
-
84979291225
-
Broadcast encryption
-
Stinson, D.R., ed.: CRYPTO 1993. Springer
-
Fiat, A., Naor, M.: Broadcast encryption. In Stinson, D.R., ed.: CRYPTO 1993. Volume 773 of Lecture Notes in Computer Science., Springer (1994) 480-491
-
(1994)
Lecture Notes in Computer Science
, vol.773
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
8
-
-
84880852861
-
Revocation and tracing schemes for stateless receivers
-
Kilian, J., ed.: CRYPTO 2001. Springer
-
Naor, D., Naor, M., Lotspiech, J.: Revocation and tracing schemes for stateless receivers. In Kilian, J., ed.: CRYPTO 2001. Volume 2139 of Lecture Notes in Computer Science., Springer (2001) 41-62
-
(2001)
Lecture Notes in Computer Science
, vol.2139
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.3
-
9
-
-
0002380073
-
Tamper resistance - A cautionary note
-
Tygar, D., ed.: USENIX
-
Anderson, R.J., Kuhn, M.: Tamper resistance - a cautionary note. In Tygar, D., ed.: USENIX Electronic Commerce 1996, USENIX (1996) 1-11
-
(1996)
USENIX Electronic Commerce 1996
, pp. 1-11
-
-
Anderson, R.J.1
Kuhn, M.2
-
11
-
-
29244478317
-
Support for multi-level security policies in DRM architectures
-
ACM Press
-
Popescu, B.C., Crispo, B., Tanenbaum, A.S.: Support for multi-level security policies in DRM architectures. In: NSPW 2004, ACM Press (2005) 3-9
-
(2005)
NSPW 2004
, pp. 3-9
-
-
Popescu, B.C.1
Crispo, B.2
Tanenbaum, A.S.3
-
12
-
-
84941164630
-
High-bandwidth digital content protection system
-
Digital Content Protection, LLC: High-bandwidth digital content protection system. Specification Revision 1.1 (2003) URL http://www.digital-cp.com/home/HDCPSpecificationRev1_1.pdf.
-
(2003)
Specification Revision 1.1
-
-
-
13
-
-
84941161503
-
-
Specification Revision 1.4 (2005)
-
Digital Transmission Licensing Administrator, LLC: Digital transmission content protection specification volume 1. Specification Revision 1.4 (2005) URL http://www.dtcp.com/data/info%2020050228%20dtcp%20vol%201%20%201p4.pdf.
-
Digital Transmission Content Protection Specification
, vol.1
-
-
-
14
-
-
84937435227
-
The LSD broadcast encryption scheme
-
Yung, M., ed.: CRYPTO 2002. Springer
-
Halevy, D., Shamir, A.: The LSD broadcast encryption scheme. In Yung, M., ed.: CRYPTO 2002. Volume 2442 of Lecture Notes in Computer Science., Springer (2002) 47-60
-
(2002)
Lecture Notes in Computer Science
, vol.2442
, pp. 47-60
-
-
Halevy, D.1
Shamir, A.2
-
15
-
-
85030481487
-
How to broadcast a secret
-
Davies, D.W., ed.: EUROCRYPT 1991. Springer
-
Berkovits, S.: How to broadcast a secret. In Davies, D.W., ed.: EUROCRYPT 1991. Volume 547 of Lecture Notes in Computer Science., Springer (1991) 535-541
-
(1991)
Lecture Notes in Computer Science
, vol.547
, pp. 535-541
-
-
Berkovits, S.1
-
16
-
-
35248901924
-
Public key broadcast encryption for stateless receivers
-
Feigenbaum, J., ed.: Digital Rights Management Workshop. Springer
-
Dodis, Y., Fazio, N.: Public key broadcast encryption for stateless receivers. In Feigenbaum, J., ed.: Digital Rights Management Workshop. Volume 2696 of Lecture Notes in Computer Science., Springer (2003) 61-80
-
(2003)
Lecture Notes in Computer Science
, vol.2696
, pp. 61-80
-
-
Dodis, Y.1
Fazio, N.2
-
17
-
-
24944542406
-
One-way chain based broadcast encryption schemes
-
Cramer, R., ed.: EUROCRYPT 2005. Springer
-
Jho, N.S., Hwang, J.Y., Cheon, J.H., Kim, M.H., Lee, D.H., Yoo, E.S.: One-way chain based broadcast encryption schemes. In Cramer, R., ed.: EUROCRYPT 2005. Volume 3494 of Lecture Notes in Computer Science., Springer (2005) 559-574
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 559-574
-
-
Jho, N.S.1
Hwang, J.Y.2
Cheon, J.H.3
Kim, M.H.4
Lee, D.H.5
Yoo, E.S.6
|