|
[1] F. K. Tu, C. S. Laih, and S. H. Toung, "On key distribution management for condition access system on Pay-TV system," in 1998 IEEE Int. Symp. Consumer Electronics (ISCE'98), vol. 45, pp. 151–159, 1998.
[2] Y. L. Huang, S. Shieh, F. S. Ho, and J. L. Wang, "Efficient Key Distribution Schemes for Secure Media Delivery in Pay-TV Systems," in IEEE Trans. Multimedia, vol. 6, no. 5, pp. 760–769, Oct. 2004.
[3] "Conditional-Access Broadcasting Systems," ITU Rec. 810, 1992.
[4] E. Cruselles, J. L. Melus, and M. Soriano, "An overview of security in Eurocrypt conditional access system," in IEEE Global Telecommunications Conf., vol. 1, pp. 188–193, 1993.
[5] B. M. Macq and J. J. Quisquater, “Cryptology for digital TV broadcasting,” in Proceedings of the IEEE, vol. 83, no. 6, pp. 944-957, June 1995.
[6] W. Lee, "Key Distribution and Management for Conditional Access System on DBS," in Proceedings of International Conf. Cryptology and Information Security, pp. 82–86, 1996.
[7] H. Sakakibara et al., “The ID-based noninteractive group communication key sharing scheme using smart cards,” in Proc. Int. Conf. Network Protocols, 1994, pp. 91-98.
[8] T. D. C. Little and D. Venkatesh, “Prospects for interactive video-on-demand,” IEEE Multimedia, pp. 14-23, Fall 1994.
[9] K. C. Almeroth and M. H. Ammar, “The use of multicast delivery to provide a scalable and interactive video-on-demand service,” IEEE J. Selected areas Commun., vol. 14, Aug. 1996.
[10] S. Viswanathan and T. Imielinski, “Metropolitan area video-on-demand service using pyramid broadcasting,” Multimedia Syst., vol. 4, no. 4, pp. 197-208, 1994.
[11] L. S. Juhn and L. M. Tseng, “Staircase data broadcasting and receiving scheme for hot video service,” IEEE Trans. Consumer Electron., vol. 43, no. 4, pp. 1110-1117, Nov. 1997.
[12] D. Wallner, E. Harder, and R. Agee, “Key Management for Multicast: Issues and Architectures,” RFC 2627, 1999.
[13] S. G. Akl and P. D. Taylor, "Cryptographic Solution to a Problem of Access Control in a Hierarchy," in ACM Trans. Computer Systems, vol. 1, no. 3, pp. 239–248, 1982.
[14] R. L. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Comm. ACM, vol. 21, no. 2, pp. 120-126, Feb. 1978.
[15] S. J. Mackinnon, P. D. Taylor, H. Meijer, and S. G. AKl, "An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy," in IEEE Trans. Computers, vol. 34, no. 9, pp. 797–802, Sept. 1985.
[16] B. Liu, W. Zhang, and T. Jiang "A Scalable Key Distribution Scheme for Conditional Access System in Digital Pay-TV System," in IEEE Trans. Consumer Electronics, vol. 50, no. 2, pp. 632–637, May 2004.
[17] W. G. Tzeng, "A Time-Bouned Cryptographic Key Assignment Scheme for Access Control in a Hierarchy," in IEEE Trans. Knowledge and Data Eng., vol. 14, no. 1, pp. 182–188, Jan./Feb. 2002.
[18] X. Yi and Y. Ye, “Security Analysis of Tzeng’s Time-Bound Key Assignment Scheme for Access Control in a Hierarchy,” IEEE Trans. Knowledge and Data Eng., vol. 15, no. 4, pp. 1054-1055, July/Aug. 2003.
[19] H. Y. Chien, “Efficient Time-Bound Hierarchical Key Assignment Scheme,” IEEE Trans. Knowledge and Data Eng., vol. 16, no. 10, pp. 1301-1304, Oct. 2004.
[20] S. Y. Wang, C. S. Laih, "Merging: An Efficient Solution for a Time-Bound Hierarchical Key Assignment Scheme," in IEEE Trans. Dependable and Secure Computing, vol. 3, no. 1, pp. 91–100, Jan.-Mar. 2006.
[21] A. Fiat and M. Naor, "Broadcast Encryption," Advances in Cryptology - CRYPTO '93, Lecture Notes in Computer Science 733, Springer, pp. 480–491, 1994.
[22] D. Naor, M. Naor, J. Lotspiech, "Revocation and Tracing Schemes for Stateless Receivers," in Proc. Crypto 2001, Lecture Notes in Computer Science, pp. 41–62, Aug. 2001.
[23] D. Halevi and A. Shamir, “The LSD Broadcast Encryption Scheme,” in M. Yung (Ed): Proceedings of Crypto 2002, vol. 2442 of LNCS, pp. 47-60, Aug. 2002.
[24] Y. Dodis and N. Fazio. “Public Key Broadcast Encryption for Stateless Receivers,” in Proceedings of the Digital Rights Management Workshop 2002, vol. 2696 of LNCS, pp. 61-80, 2002.
[25] C. K. Wong, M. Gouda and S. Lam, "Secure Group Communications Using Key Graphics," SIGCOMM, 1998.
[26] B. Chor, A. Fiat, M. Naor and B. Pinkas, “Tracing traitors,” in IEEE Transactions on Information Theory, vol. 46, No. 3, pp. 893-910, May 2000.
[27] S. Mitsunari, R. Sakai and M. Kasahara, "A New Traitor Tracing," in IEICE Trans. Fundamentals of Electronics, vol. E85-A, No. 2, pp. 481–484, Feb. 2002.
[28] V. D. To, R. Safavi-Naini, F. Zhang, "New Traitor Tracing Schemes Using Bilinear Map," in ACM Workshop on DRM'03, Washington, DC, USA, pp. 67–76, Oct. 27, 2003.
[29] M. Naor, B. Pinkas, “Efficient Trace and Revoke Schemes,” in Proceedings of the 4-th international Conference on Financial Cryptography, vol. 1962 of LNCS, pp. 1-20, 2000.
[30] NITS. “Secure hash standard,” Tech. Rep. FIPS 180-1, NITS, US Department Commerce, April 1995.
[31] R. Rivest, “The MD5 message digest algorithm,” Tech. Rep. RFC 1321, April 1992.
|