Sciweavers

78 search results - page 8 / 16
» Long-Lived Broadcast Encryption
Sort
View
DRM
2005
Springer
13 years 9 months ago
New broadcast encryption scheme using tree-based circle
Nam-Su Jho, Eun Sun Yoo, Jung Hee Cheon, Myung-Hwa...
EJWCN
2011
119views more  EJWCN 2011»
13 years 2 months ago
Broadcast Secrecy via Key-Chain-Based Encryption in Single-Hop Wireless Sensor Networks
Vijay Sivaraman, Diethelm Ostry, Jaleel Shaheen, A...
CCS
2006
ACM
13 years 11 months ago
Attribute-based encryption for fine-grained access control of encrypted data
As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data, is t...
Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Wate...
SIGECOM
2005
ACM
130views ECommerce» more  SIGECOM 2005»
14 years 1 months ago
Graceful service degradation (or, how to know your payment is late)
When distributing digital content over a broadcast channel it’s often necessary to revoke users whose access privileges have expired, thus preventing them from recovering the co...
Alexandr Andoni, Jessica Staddon
APNOMS
2006
Springer
13 years 11 months ago
A Novel Rekey Management Scheme in Digital Broadcasting Network
Conditional Access System (CAS) performs entitlement management to make only legitimate subscribers watch pay-services. Generally, CAS uses passive entitlement management to fulfil...
Han-Seung Koo, Il-Kyoo Lee, Jae-Myung Kim, Sung-Wo...