메뉴 건너뛰기




Volumn , Issue , 2008, Pages

Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems

Author keywords

[No Author keywords available]

Indexed keywords

IPTV; NETWORK SECURITY; TELEVISION BROADCASTING;

EID: 85180804257     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (29)

References (36)
  • 4
    • 77953422353 scopus 로고    scopus 로고
    • Accessed May 4th
    • M. Berman. The Programming Insider. www.mediaweek.com/mw/newsletters/ proginsider/index.jsp, Accessed May 4th, 2007.
    • (2007) The Programming Insider
    • Berman, M.1
  • 7
    • 0036311802 scopus 로고    scopus 로고
    • A uniform framework for regulating service access and information release on the web
    • P. A. Bonatti and P. Samarati. A uniform framework for regulating service access and information release on the web. Journal of Computer Security, 10(3), 2002.
    • (2002) Journal of Computer Security , vol.10 , Issue.3
    • Bonatti, P. A.1    Samarati, P.2
  • 13
    • 0031619016 scopus 로고    scopus 로고
    • The Random Oracle Methodology, Revisited (Preliminary Version)
    • R. Canetti, O. Goldreich, and S. Halevi. The Random Oracle Methodology, Revisited (Preliminary Version). In STOC, pages 209-218, 1998.
    • (1998) STOC , pp. 209-218
    • Canetti, R.1    Goldreich, O.2    Halevi, S.3
  • 14
    • 77950151506 scopus 로고    scopus 로고
    • An identity based encryption scheme based on quadratic residues
    • C. Cocks. An identity based encryption scheme based on quadratic residues. In IMA Int. Conf., pages 360-363, 2001.
    • (2001) IMA Int. Conf , pp. 360-363
    • Cocks, C.1
  • 15
    • 0029535788 scopus 로고
    • Functional model of a conditional access system
    • EBU Project Group B/C/A. Winter
    • EBU Project Group B/C/A. Functional model of a conditional access system. EBU Technical Review, (266):64-77, Winter 1995.
    • (1995) EBU Technical Review , Issue.266 , pp. 64-77
  • 23
    • 38149054118 scopus 로고    scopus 로고
    • B. Lynn. PBC library. http://rooster.stanford.edu/~ben/pbc/, 2007.
    • (2007) PBC library
    • Lynn, B.1
  • 29
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir. How to share a secret. Commun. ACM, 22(11):612-613, 1979.
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 33
    • 85180734804 scopus 로고    scopus 로고
    • Nielsens ratings for April 23 April 29
    • USA TODAY. Nielsens ratings for April 23 - April 29. http://www.usatoday.com/life/ television/news/nielsens-charts.htm, 2007.
    • (2007)
  • 36
    • 1642327001 scopus 로고    scopus 로고
    • Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
    • T. Yu, M. Winslett, and K. E. Seamons. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Trans. Inf. Syst. Secur., 6(1):1-42, 2003.
    • (2003) ACM Trans. Inf. Syst. Secur , vol.6 , Issue.1 , pp. 1-42
    • Yu, T.1    Winslett, M.2    Seamons, K. E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.