CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
The official PGP user's guide
Secure group communications using key graphs
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
SCAN-Based Compression-Encryption-Hiding for Video on Demand
IEEE MultiMedia
MULTIMEDIA '03 Proceedings of the eleventh ACM international conference on Multimedia
Alliance formation for DDoS defense
Proceedings of the 2003 workshop on New security paradigms
A DRM security architecture for home networks
Proceedings of the 4th ACM workshop on Digital rights management
Support for multi-level security policies in DRM architectures
NSPW '04 Proceedings of the 2004 workshop on New security paradigms
An Intelligent Digital Content Protection Framework Between Home Network Receiver Devices
Computational Intelligence and Security
DVB Service Security--A Problem in Development of Multi-service Television
EUROITV '08 Proceedings of the 6th European conference on Changing Television Environments
Key Tree and Chinese Remainder Theorem Based Group Key Distribution Scheme
ICA3PP '09 Proceedings of the 9th International Conference on Algorithms and Architectures for Parallel Processing
Optimal subset-difference broadcast encryption with free riders
Information Sciences: an International Journal
Broadcast encryption versus public key cryptography in content protection systems
Proceedings of the nineth ACM workshop on Digital rights management
Broadcast Encryption-Based P2P DRM without Central License Server
PCM '09 Proceedings of the 10th Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
Efficient broadcast encryption with user profiles
Information Sciences: an International Journal
Implementing DRM over peer-to-peer networks with broadcast encryption
PCM'07 Proceedings of the multimedia 8th Pacific Rim conference on Advances in multimedia information processing
Towards runtime migration of WS-BPEL processes
ICSOC/ServiceWave'09 Proceedings of the 2009 international conference on Service-oriented computing
Security weaknesses of certain broadcast encryption schemes
DRMTICS'05 Proceedings of the First international conference on Digital Rights Management: technologies, Issues, Challenges and Systems
A novel broadcast encryption based on time-bound cryptographic keys
DRMTICS'05 Proceedings of the First international conference on Digital Rights Management: technologies, Issues, Challenges and Systems
Hi-index | 4.10 |
Broadcast encryption was designed to answer the question--Can two devices, previously unknown to each other, agree upon a key if they only have a one-way communication path? They can, and the one-way nature of this communication gives the technology its name. Recent advances in broadcast encryption threaten to unseat public key encryption's use in certain applications. To commercialize the technology for media content protection, IBM, Intel, Matsushita, and Toshiba developed the Content Protection for Recordable Media technology. Devices that use CPRM have already been marketed, including digitalaudio players and video recorders, and some flash-memory music players. The authors' work focuses on various aspects of content protection, which they consider to be the ideal application for broadcast encryption.