-
1
-
-
0027874710
-
An overview of security in Eurocrypt conditional access system
-
E. Cruselles, J. L. Melus, and M. Soriano, "An overview of security in Eurocrypt conditional access system," in Proc. IEEE Int. Conf. Global Telecommunicatiom(GLBOECOM'93), 1993, vol. 1, pp. 188-193.
-
(1993)
Proc. IEEE Int. Conf. Global Telecommunicatiom(GLBOECOM'93)
, vol.1
, pp. 188-193
-
-
Cruselles, E.1
Melus, J.L.2
Soriano, M.3
-
2
-
-
1942517199
-
Key distribution and management for conditional access system on DBS
-
J. W. Lee, "Key distribution and management for conditional access system on DBS," in Proc. Int. Conf. Cryptology and Information Security, 1996, pp. 82-86.
-
(1996)
Proc. Int. Conf. Cryptology and Information Security
, pp. 82-86
-
-
Lee, J.W.1
-
3
-
-
0032626528
-
On key distribution management for conditional access system on pay-TV system
-
Feb
-
F.-K. Tu, C.-S. Laih, and H.-H. Tung, "On key distribution management for conditional access system on pay-TV system," IEEE Trans. Consum. Electron., vol. 45, no. 1, pp. 151-158, Feb. 1999.
-
(1999)
IEEE Trans. Consum. Electron
, vol.45
, Issue.1
, pp. 151-158
-
-
Tu, F.-K.1
Laih, C.-S.2
Tung, H.-H.3
-
4
-
-
4744359731
-
Efficient key distribution schemes for secure media delivery in pay-TV systems
-
Oct
-
Y.-L. Huang, S. Shieh, F.-S. Ho, and J.-C.Wang, "Efficient key distribution schemes for secure media delivery in pay-TV systems," IEEE Trans. Multimedia, vol. 6, no. 5, pp. 760-769, Oct. 2004.
-
(2004)
IEEE Trans. Multimedia
, vol.6
, Issue.5
, pp. 760-769
-
-
Huang, Y.-L.1
Shieh, S.2
Ho, F.-S.3
Wang, J.C.4
-
5
-
-
48749088734
-
Based on cryptosystem secure communication between set-top box and smart card in DTV broadcasting
-
T.-W. Hou, J.-T. Lai, and C.-L. Yen, "Based on cryptosystem secure communication between set-top box and smart card in DTV broadcasting," in Proc. IEEE Region 10 Conference (TENCON' 07), 2007, pp. 1-5.
-
(2007)
Proc. IEEE Region 10 Conference (TENCON' 07)
, pp. 1-5
-
-
Hou, T.-W.1
Lai, J.-T.2
Yen, C.-L.3
-
6
-
-
84936892450
-
Cryptology for digital TV broadcasting
-
Jun
-
B. M. Macq and J. J. Quisquater, "Cryptology for digital TV broadcasting," Proc. IEEE, vol. 83, no. 6, pp. 944-957, Jun. 1995.
-
(1995)
Proc. IEEE
, vol.83
, Issue.6
, pp. 944-957
-
-
Macq, B.M.1
Quisquater, J.J.2
-
7
-
-
0034505806
-
-
Y.-L. Huang, S. Shieh, and J.-C. Wang, Practical key distribution schemes for channel protection, in Proc. Int. Conf. Computer Software and Applications COMPSAC'OO, 2000, pp. 569-574
-
Y.-L. Huang, S. Shieh, and J.-C. Wang, "Practical key distribution schemes for channel protection," in Proc. Int. Conf. Computer Software and Applications (COMPSAC'OO), 2000, pp. 569-574.
-
-
-
-
8
-
-
1942423668
-
Key distribution based on hierarchical access control for conditional access system in DTV broadcast
-
Feb
-
T. Jiang, S. Zheng, and B. Liu, "Key distribution based on hierarchical access control for conditional access system in DTV broadcast," IEEE Trans. Consumer Electron., vol. 50, no. 1, pp. 225-230, Feb. 2004.
-
(2004)
IEEE Trans. Consumer Electron
, vol.50
, Issue.1
, pp. 225-230
-
-
Jiang, T.1
Zheng, S.2
Liu, B.3
-
9
-
-
4043064411
-
A scalable key distribution scheme for conditional access system in digital pay-TV system
-
May
-
B. Liu, W. Zhang, and T. Jiang, "A scalable key distribution scheme for conditional access system in digital pay-TV system," IEEE Trans. Consumer Electron., vol. 50, no. 2, pp. 632-637, May 2004.
-
(2004)
IEEE Trans. Consumer Electron
, vol.50
, Issue.2
, pp. 632-637
-
-
Liu, B.1
Zhang, W.2
Jiang, T.3
-
10
-
-
54949102806
-
-
Conditional-Access Broadcasting Systems 1992, ITU Rec. 810.
-
Conditional-Access Broadcasting Systems 1992, ITU Rec. 810.
-
-
-
-
11
-
-
84979291225
-
Broadcast encryption
-
Springer
-
A. Fiat and M. Naor, "Broadcast encryption," in Proc. Crypto 2001, Lecture Notes in Computer Science, 1994, pp. 480-491, Springer.
-
(1994)
Proc. Crypto 2001, Lecture Notes in Computer Science
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
12
-
-
84880852861
-
Revocation and tracing schemes for stateless receivers
-
Springer
-
D. Naor, M. Naor, and J. Lotspiech, "Revocation and tracing schemes for stateless receivers," in Proc. Advances in Cryptology-(CRYPTO'Ol) , 2001, vol. 1, pp. 41-62, Springer.
-
(2001)
Proc. Advances in Cryptology-(CRYPTO'Ol)
, vol.1
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.3
-
13
-
-
0034188648
-
Tracing traitors
-
May
-
B. Chor, A. Fiat, M. Naor, and B. Pinkas, "Tracing traitors," IEEE Trans. Inf. Theory, vol. 46, no. 3, pp. 893-910, May 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, Issue.3
, pp. 893-910
-
-
Chor, B.1
Fiat, A.2
Naor, M.3
Pinkas, B.4
-
15
-
-
0033893174
-
Secure group communications using key graphs
-
Feb
-
C. K.Wong, M. Gouda, and S. S. Lam, "Secure group communications using key graphs," IEEE/ACM Trans. Netw., vol. 8, no. 1, pp. 16-30, Feb. 2000.
-
(2000)
IEEE/ACM Trans. Netw
, vol.8
, Issue.1
, pp. 16-30
-
-
Wong, C.K.1
Gouda, M.2
Lam, S.S.3
-
16
-
-
3142512728
-
Tree-based group key agreement
-
Feb
-
Y. Kim, A. Perrig, and G. Tsudik, "Tree-based group key agreement," ACM Trans, on Info, and Sys. Sec., vol. 7, no. 1, pp. 60-96, Feb. 2004.
-
(2004)
ACM Trans, on Info, and Sys. Sec
, vol.7
, Issue.1
, pp. 60-96
-
-
Kim, Y.1
Perrig, A.2
Tsudik, G.3
-
17
-
-
13844281059
-
Efficient time-bound hierarchical key assignment scheme
-
Oct
-
H.-Y. Chen, "Efficient time-bound hierarchical key assignment scheme," IEEE Trans. Knowl. Data Eng., vol. 16, no. 10, pp. 1301-1304, Oct. 2004.
-
(2004)
IEEE Trans. Knowl. Data Eng
, vol.16
, Issue.10
, pp. 1301-1304
-
-
Chen, H.-Y.1
-
18
-
-
84943243577
-
LKHW: A directed diffusion-based secure multicast scheme for wireless sensor networks
-
R. Di Pietro, L. V. Mancini, Y. W. Law, S. Etalle, and P. Havinga, "LKHW: A directed diffusion-based secure multicast scheme for wireless sensor networks," in Proc. Int. Conf. Parallel Processing Workshops (ICPPW'03), 2003, pp. 397-406.
-
(2003)
Proc. Int. Conf. Parallel Processing Workshops (ICPPW'03)
, pp. 397-406
-
-
Di Pietro, R.1
Mancini, L.V.2
Law, Y.W.3
Etalle, S.4
Havinga, P.5
-
19
-
-
3242657408
-
Group key agreement efficient in communication
-
July
-
Y. Kim, A. Perrig, and G. Tsudik, "Group key agreement efficient in communication," IEEE Trans. Comput., vol. 53, no. 7, pp. 905-921, July 2004.
-
(2004)
IEEE Trans. Comput
, vol.53
, Issue.7
, pp. 905-921
-
-
Kim, Y.1
Perrig, A.2
Tsudik, G.3
-
20
-
-
0036187601
-
A time-bound cryptographic key assignment scheme for access control in a hierarchy
-
Jan./Feb
-
W.-G. Tzeng, "A time-bound cryptographic key assignment scheme for access control in a hierarchy," IEEE Trans. Knowl. Data Eng., pp. 182-188, Jan./Feb. 2002.
-
(2002)
IEEE Trans. Knowl. Data Eng
, pp. 182-188
-
-
Tzeng, W.-G.1
-
21
-
-
0000636954
-
The versaKey framework: Versatile group key management
-
Sept
-
M. Waldvogel, G. Caronni, D. Sun, N. Weiler, and B. Plattner, "The versaKey framework: Versatile group key management," IEEE J. Sel. Areas Commun., vol. 17, no. 9, pp. 1614-1631, Sept. 1999.
-
(1999)
IEEE J. Sel. Areas Commun
, vol.17
, Issue.9
, pp. 1614-1631
-
-
Waldvogel, M.1
Caronni, G.2
Sun, D.3
Weiler, N.4
Plattner, B.5
-
22
-
-
32844471813
-
Merging: An efficient solution for a timebound hierarchical key assignment scheme
-
Jan./Mar
-
W.-Y.Wang and C.-S. Laih, "Merging: An efficient solution for a timebound hierarchical key assignment scheme," IEEE Trans. Dependable Secure Comput., vol. 3, no. 1, pp. 91-100, Jan./Mar. 2006.
-
(2006)
IEEE Trans. Dependable Secure Comput
, vol.3
, Issue.1
, pp. 91-100
-
-
Wang, W.Y.1
Laih, C.-S.2
-
24
-
-
4143126590
-
P2VoD: Providing fault tolerant video-on-demand streaming in peer-to-peer environment
-
T. T. Do, K. A. Hua, and M. A. Tantaoui, "P2VoD: Providing fault tolerant video-on-demand streaming in peer-to-peer environment," in Proc. IEEE Int. Conf. Communications (ICC'04), 2004, vol. 3, pp. 1467-1472.
-
(2004)
Proc. IEEE Int. Conf. Communications (ICC'04)
, vol.3
, pp. 1467-1472
-
-
Do, T.T.1
Hua, K.A.2
Tantaoui, M.A.3
-
25
-
-
36348992075
-
An alliance based peering scheme for P2P live media streaming
-
Dec
-
D. Purandare and R. Guha, "An alliance based peering scheme for P2P live media streaming," IEEE Trans. Multimedia, vol. 9, no. 8, pp. 1633-1644, Dec. 2007.
-
(2007)
IEEE Trans. Multimedia
, vol.9
, Issue.8
, pp. 1633-1644
-
-
Purandare, D.1
Guha, R.2
-
27
-
-
26844488588
-
An active buffer management technique for providing interactive functions in broadcast video-on-demand systems
-
Oct
-
Z. Fei, M. H. Ammar, I. Kamel, and S. Mukherjee, "An active buffer management technique for providing interactive functions in broadcast video-on-demand systems," IEEE Trans. Multimedia, vol. 7, no. 5, pp. 942-950, Oct. 2005.
-
(2005)
IEEE Trans. Multimedia
, vol.7
, Issue.5
, pp. 942-950
-
-
Fei, Z.1
Ammar, M.H.2
Kamel, I.3
Mukherjee, S.4
-
29
-
-
54949148796
-
DVB: From broadcasting to ip delivery
-
Jan
-
H. Bürklin, R. Schäfer, and D. Westerkamp, "DVB: From broadcasting to ip delivery," ACM SIGCOMM Comput. Commun. Rev., vol. 37, no. 1, pp. 65-67, Jan. 2007.
-
(2007)
ACM SIGCOMM Comput. Commun. Rev
, vol.37
, Issue.1
, pp. 65-67
-
-
Bürklin, H.1
Schäfer, R.2
Westerkamp, D.3
-
30
-
-
33750113218
-
Data broadcasting and interactive television
-
Jan
-
R. J. Crinon, D. Bhat, D. Catapano, G. Thomas, J. T. Van Loo, and G. Bang, "Data broadcasting and interactive television," Proc. IEEE, vol. 94, no. 1, pp. 102-118, Jan. 2006.
-
(2006)
Proc. IEEE
, vol.94
, Issue.1
, pp. 102-118
-
-
Crinon, R.J.1
Bhat, D.2
Catapano, D.3
Thomas, G.4
Van Loo, J.T.5
Bang, G.6
|