Multimedia rights management for the multiple devices of end-user
暂无分享,去创建一个
[1] Dalit Naor,et al. Broadcast Encryption , 1993, Encyclopedia of Multimedia.
[2] K. J. Ray Liu,et al. Key distribution for secure multimedia multicasts via data embedding , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).
[3] Tsutomu Matsumoto,et al. A Quick Group Key Distribution Scheme with "Entity Revocation" , 1999, ASIACRYPT.
[4] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[5] Silvio Micali,et al. How to construct random functions , 1986, JACM.
[6] Eric J. Harder,et al. Key Management for Multicast: Issues and Architectures , 1999, RFC.
[7] Alan T. Sherman,et al. Key Establishment in Large Dynamic Groups Using One-Way Function Trees , 2003, IEEE Trans. Software Eng..
[8] Jessica Staddon,et al. Combinatorial Bounds for Broadcast Encryption , 1998, EUROCRYPT.
[9] Moni Naor,et al. Multicast security: a taxonomy and some efficient constructions , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[10] Benny Pinkas. Efficient State Updates for Key Management , 2001, Digital Rights Management Workshop.
[11] Moni Naor,et al. Revocation and Tracing Schemes for Stateless Receivers , 2001, CRYPTO.
[12] Michael Luby,et al. Pseudorandomness and cryptographic applications , 1996, Princeton computer science notes.