Sciweavers

222 search results - page 33 / 45
» Secure Content Delivery using Key Composition
Sort
View
ASIACRYPT
2003
Springer
14 years 25 days ago
A Traceable Block Cipher
In this paper1 we propose a new symmetric block cipher with the following paradoxical traceability properties: it is computationally easy to derive many equivalent secret keys prov...
Olivier Billet, Henri Gilbert
POLICY
2001
Springer
14 years 1 days ago
The Ponder Policy Specification Language
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databas...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...
ICMCS
2009
IEEE
82views Multimedia» more  ICMCS 2009»
13 years 5 months ago
An interactive video streaming architecture for H.264/AVC compliant players
In this paper, we describe an interactive streaming architecture. The content streamed by this architecture is encoded with the H.264/AVC standard for video compression. The archi...
Etienne Bömcke, Christophe De Vleeschouwer
FSE
2009
Springer
189views Cryptology» more  FSE 2009»
14 years 8 months ago
Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2)
MULTI2 is the block cipher used in the ISDB standard for scrambling digital multimedia content. MULTI2 is used in Japan to secure multimedia broadcasting, including recent applicat...
Jean-Philippe Aumasson, Jorge Nakahara Jr., Pouyan...
IADIS
2004
13 years 9 months ago
Using SPKI/SDSI for Distributed Maintenance of Attribute Release Policies in Shibboleth
The Shibboleth middleware from Internet2 provides a way for users at higher-education institutions to access remote electronic content in compliance with the inter-institutional l...
Sidharth Nazareth, Sean W. Smith