-
1
-
-
84936892450
-
Cryptology for digital TV broadcasting
-
Jun
-
B. M. Macq and J. J. Quisquater, "Cryptology for digital TV broadcasting," Proc. IEEE, vol. 83, no. 6, pp. 944-957, Jun. 1995.
-
(1995)
Proc. IEEE
, vol.83
, Issue.6
, pp. 944-957
-
-
Macq, B.M.1
Quisquater, J.J.2
-
2
-
-
0029535788
-
Functional model of a conditional access system
-
Winter: EBU Project Group B/CA
-
"Functional model of a conditional access system," in EBU Tech. Rev.. Winter: EBU Project Group B/CA, 1995, pp. 64-77.
-
(1995)
EBU Tech. Rev
, pp. 64-77
-
-
-
3
-
-
84976752387
-
Cryptographic solution to a problem of access control in a hierarchy
-
S. G. Akl and P. D. Taylor, "Cryptographic solution to a problem of access control in a hierarchy," ACM Trans. Comput. Syst., vol. 1, no. 3, pp. 239-248, 1983.
-
(1983)
ACM Trans. Comput. Syst
, vol.1
, Issue.3
, pp. 239-248
-
-
Akl, S.G.1
Taylor, P.D.2
-
4
-
-
0036187601
-
A time-bound cryptographic key assignment scheme for access control in a hierarchy
-
Jan./Feb
-
W. G. Tzeng, "A time-bound cryptographic key assignment scheme for access control in a hierarchy," IEEE Trans. Knowl. Data Eng., vol. 14, no. 1, pp. 182-188, Jan./Feb. 2002.
-
(2002)
IEEE Trans. Knowl. Data Eng
, vol.14
, Issue.1
, pp. 182-188
-
-
Tzeng, W.G.1
-
5
-
-
32844471813
-
Merging: An efficient solution for a time-bound hierarchical key assignment scheme
-
Jan.-Mar
-
S. Y. Wang and C. S. Laih, "Merging: An efficient solution for a time-bound hierarchical key assignment scheme," IEEE Trans. Depend. Secure Comput., vol. 3, no. 1, pp. 91-100, Jan.-Mar. 2006.
-
(2006)
IEEE Trans. Depend. Secure Comput
, vol.3
, Issue.1
, pp. 91-100
-
-
Wang, S.Y.1
Laih, C.S.2
-
6
-
-
41549139144
-
-
Conditional-Access Broadcasting Systems 1992, ITU-R Rec. 8.10.
-
Conditional-Access Broadcasting Systems 1992, ITU-R Rec. 8.10.
-
-
-
-
7
-
-
1942517199
-
Key distribution and management for conditional access system on DBS
-
J. W. Lee, "Key distribution and management for conditional access system on DBS," in Proc. Int. Conf. Cryptology and Information Security, 1996, pp. 82-86.
-
(1996)
Proc. Int. Conf. Cryptology and Information Security
, pp. 82-86
-
-
Lee, J.W.1
-
8
-
-
0032626528
-
On key distribution management for conditional access system on pay-TV system
-
Feb
-
F. K. Tu, C. S. Laih, and S. H. Toung, "On key distribution management for conditional access system on pay-TV system," IEEE Trans. Consumer Electron., vol. 45, no. 1, pp. 151-158, Feb. 1999.
-
(1999)
IEEE Trans. Consumer Electron
, vol.45
, Issue.1
, pp. 151-158
-
-
Tu, F.K.1
Laih, C.S.2
Toung, S.H.3
-
9
-
-
4744359731
-
Efficient key distribution schemes for secure media delivery in pay-TV systems
-
Oct
-
Y. L. Huang and S. Shieh, "Efficient key distribution schemes for secure media delivery in pay-TV systems," IEEE Trans. Multimedia, vol. 6, no. 5, pp. 760-769, Oct. 2004.
-
(2004)
IEEE Trans. Multimedia
, vol.6
, Issue.5
, pp. 760-769
-
-
Huang, Y.L.1
Shieh, S.2
-
10
-
-
4043064411
-
A scalable key distribution scheme for conditional access system in digital pay-TV system
-
May
-
B. Liu, W. Zhang, and T. Jiang, "A scalable key distribution scheme for conditional access system in digital pay-TV system," IEEE Trans. Consumer Electron., vol. 50, no. 2, pp. 632-637, May 2004.
-
(2004)
IEEE Trans. Consumer Electron
, vol.50
, Issue.2
, pp. 632-637
-
-
Liu, B.1
Zhang, W.2
Jiang, T.3
-
12
-
-
41549166500
-
-
Support for Use of Scrambling and Conditional Access (CA) Within Digital Broadcasting Systems Digital Video Broadcasting (DVB), 1996, ETR 289.
-
Support for Use of Scrambling and Conditional Access (CA) Within Digital Broadcasting Systems Digital Video Broadcasting (DVB), 1996, ETR 289.
-
-
-
-
14
-
-
84880852861
-
Revocation and tracing schemes for stateless receivers
-
Advances in Cryptology, CRYPTO'01
-
D. Naor, M. Naor, and J. B. Lotspiech, "Revocation and tracing schemes for stateless receivers," in Advances in Cryptology - CRYPTO'01, 2001, vol. 2139, LNCS, pp. 41-62.
-
(2001)
LNCS
, vol.2139
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.B.3
-
15
-
-
0032661699
-
Multicast security: A taxonomy and some efficient constructions
-
Mar
-
R. Canetti, J. Garey, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas, "Multicast security: A taxonomy and some efficient constructions," in Proc. IEEEInfocomm'99, Mar. 1999, vol. 2, pp. 708-716.
-
(1999)
Proc. IEEEInfocomm'99
, vol.2
, pp. 708-716
-
-
Canetti, R.1
Garey, J.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
18
-
-
41549113741
-
-
An Ultra High Speed AES (Rijndael) Crypto Processor DeverSYS, Corp
-
An Ultra High Speed AES (Rijndael) Crypto Processor DeverSYS, Corp..
-
-
-
-
19
-
-
8344221947
-
Scalable hierarchical access control in secure group communications
-
Mar. 7-11
-
Y. Sun and K. J. R. Liu, "Scalable hierarchical access control in secure group communications," in Proc. INFOCOM 2004, Mar. 7-11, 2004, vol. 2, pp. 1296-1306.
-
(2004)
Proc. INFOCOM 2004
, vol.2
, pp. 1296-1306
-
-
Sun, Y.1
Liu, K.J.R.2
-
20
-
-
0038043478
-
Key establishment in large dynamic groups using one-way function trees
-
May
-
A. T. Sherman and D. A. McGrew, "Key establishment in large dynamic groups using one-way function trees," IEEE Trans. Softw. Eng., vol. 29, no. 5, pp. 444-458, May 2003.
-
(2003)
IEEE Trans. Softw. Eng
, vol.29
, Issue.5
, pp. 444-458
-
-
Sherman, A.T.1
McGrew, D.A.2
-
21
-
-
41549122776
-
-
H. Harney and E. Harder, Logical Key Hierarchy Protocol IETF, 1999 [Online]. Available: Internet Draft, draft-hamey-sparta-lkhp-sec-00.txt
-
H. Harney and E. Harder, Logical Key Hierarchy Protocol IETF, 1999 [Online]. Available: Internet Draft, draft-hamey-sparta-lkhp-sec-00.txt
-
-
-
-
22
-
-
84937435227
-
The LSD broadcast encryption scheme
-
Proc. CRYPTO 2002
-
D. Halevy and A. Shamir, "The LSD broadcast encryption scheme," in Proc. CRYPTO 2002, 2002, vol. 2442, LNCS, pp. 47-60.
-
(2002)
LNCS
, vol.2442
, pp. 47-60
-
-
Halevy, D.1
Shamir, A.2
-
23
-
-
0038384576
-
A digital rights management scheme for broadcast video
-
S. Emmanuel and M. S. Kankanhalli, "A digital rights management scheme for broadcast video," Multimedia Syst. J., vol. 8, no. 6, pp. 444-458, 2003.
-
(2003)
Multimedia Syst. J
, vol.8
, Issue.6
, pp. 444-458
-
-
Emmanuel, S.1
Kankanhalli, M.S.2
-
24
-
-
41549109740
-
Business opportunities and risks from pay-TV piracy: The case of europe
-
Omaha, NE, Aug. 11-14
-
C. Loebbecke and M. Fischer, "Business opportunities and risks from pay-TV piracy: The case of europe," in Proc. 11th Americas Conf. Information Systems, Omaha, NE, Aug. 11-14, 2005, pp. 462-471.
-
(2005)
Proc. 11th Americas Conf. Information Systems
, pp. 462-471
-
-
Loebbecke, C.1
Fischer, M.2
-
25
-
-
41549111925
-
-
Secure Hash Standard NIST, U.S. Dept. of Commerce, 2002, FIPS Publication 180-2.
-
Secure Hash Standard NIST, U.S. Dept. of Commerce, 2002, FIPS Publication 180-2.
-
-
-
-
27
-
-
33847720364
-
Overview of digital television development worldwide
-
Jan
-
Y. Wu, S. Hirakawa, U. H. Reimers, and J. Whitaker, "Overview of digital television development worldwide," Proc. IEEE, vol. 94, no. 1, pp. 8-21, Jan. 2006.
-
(2006)
Proc. IEEE
, vol.94
, Issue.1
, pp. 8-21
-
-
Wu, Y.1
Hirakawa, S.2
Reimers, U.H.3
Whitaker, J.4
-
28
-
-
33750113218
-
Data broadcasting and interactive television
-
Jan
-
R. J. Crinon, D. Bhat, D. Catapano, G. Thomas, J. T. V. Loo, and G. Bang, "Data broadcasting and interactive television," Proc. IEEE, vol. 94, no. 1, pp. 102-118, Jan. 2006.
-
(2006)
Proc. IEEE
, vol.94
, Issue.1
, pp. 102-118
-
-
Crinon, R.J.1
Bhat, D.2
Catapano, D.3
Thomas, G.4
Loo, J.T.V.5
Bang, G.6
|