메뉴 건너뛰기




Volumn 11, Issue 3, 2009, Pages 556-561

Collision attacks with budget constraints on key management schemes for secure multimedia multicast

Author keywords

Collision attack; Digital rights management; Key management; Multimedia multicast

Indexed keywords

COPYRIGHTS; MULTICASTING; MULTIMEDIA SYSTEMS;

EID: 63049127442     PISSN: 15209210     EISSN: None     Source Type: Journal    
DOI: 10.1109/TMM.2009.2012920     Document Type: Article
Times cited : (4)

References (7)
  • 1
    • 0033893174 scopus 로고    scopus 로고
    • Secure group communications using key graphs
    • Feb
    • C. K. Wong, M. Gouda, andS. S. Lam, "Secure group communications using key graphs," IEEE/ACM Trans. Netw., vol. 8, no. 1, pp. 16-30, Feb. 2000.
    • (2000) IEEE/ACM Trans. Netw , vol.8 , Issue.1 , pp. 16-30
    • Wong, C.K.1    Gouda, M.2    andS3    Lam, S.4
  • 2
    • 0344395626 scopus 로고    scopus 로고
    • Key management and distribution for secure multimedia multicast
    • Dec
    • W. Trappe, J. Song, R. Poovendran, and K. J. R. Liu, "Key management and distribution for secure multimedia multicast," IEEE Trans. Multimedia, vol. 5, no. 4, pp. 544-557, Dec. 2003.
    • (2003) IEEE Trans. Multimedia , vol.5 , Issue.4 , pp. 544-557
    • Trappe, W.1    Song, J.2    Poovendran, R.3    Liu, K.J.R.4
  • 3
    • 84880852861 scopus 로고    scopus 로고
    • Revocation and tracing schemes for stateless receivers
    • CRYPTO 2001
    • D. Naor, M. Naor, and J. Lotspiech, "Revocation and tracing schemes for stateless receivers," CRYPTO 2001, Lecture Notes in Computer Science, vol. 2139, pp. 41-62, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2139 , pp. 41-62
    • Naor, D.1    Naor, M.2    Lotspiech, J.3
  • 4
    • 15244345773 scopus 로고    scopus 로고
    • Anonymous trust: Digital rights management using broadcast encryption
    • Jun
    • J. Lotspiech, S. Nusser, and F. Pestoni, "Anonymous trust: Digital rights management using broadcast encryption," Proc. IEEE, vol. 92, no. 6, pp. 898-909, Jun. 2004.
    • (2004) Proc. IEEE , vol.92 , Issue.6 , pp. 898-909
    • Lotspiech, J.1    Nusser, S.2    Pestoni, F.3
  • 5
    • 38149103043 scopus 로고    scopus 로고
    • Security evaluation of certain broadcast encryption schemes employing a generalized time-memory-data trade-off
    • Dec
    • M. J. Mihaljevié, M. P. C. Fossorier, and H. Imai, "Security evaluation of certain broadcast encryption schemes employing a generalized time-memory-data trade-off," IEEE Commun. Lett., vol. 11, no. 12, pp. 988-990, Dec. 2007.
    • (2007) IEEE Commun. Lett , vol.11 , Issue.12 , pp. 988-990
    • Mihaljevié, M.J.1    Fossorier, M.P.C.2    Imai, H.3
  • 6
    • 51249102359 scopus 로고    scopus 로고
    • General weakness in certain broadcast encryption protocols employing the remainder approach
    • May
    • W. T. Zhu, "General weakness in certain broadcast encryption protocols employing the remainder approach," in Proc. IEEE Int. Conf. Communications (ICC) 2008, May 2008, pp. 1620-1624.
    • (2008) Proc. IEEE Int. Conf. Communications (ICC , vol.2008 , pp. 1620-1624
    • Zhu, W.T.1
  • 7
    • 0024715386 scopus 로고
    • Secure broadcasting using the secure lock
    • Aug
    • G.-H. Chiou and W.-T. Chen, "Secure broadcasting using the secure lock," IEEE Trans. Softw. Eng., vol. 15, no. 8, pp. 929-934, Aug. 1989.
    • (1989) IEEE Trans. Softw. Eng , vol.15 , Issue.8 , pp. 929-934
    • Chiou, G.-H.1    Chen, W.-T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.