References
- Darko Kirovski, Marcus Peinado, Fabien A. P. Petitcolas, "Digital Right Management for Digital Cinema," Journal of Multimedia Systems, Vol.9, No.3, pp. 228-238, 2003. https://doi.org/10.1007/s00530-003-0094-3
- Refik Molva, Alain Pannetrat, "Network Security in the Multicast Framework," Lecture Notes in Computer Science, Vol.2497, pp. 481-485, 2002.
- M. Bellare, R. Canetti, and H. Krawczyk, "Keying Hash Functions for Message Authentication," Lecture Notes in Computer Science, Vol.1109, pp. 1-15, 1996.
- M. V. D. Burmester and Y. Desmedt, "A Secure and Efficient Conference Key Distribution System," Lecture Notes in Computer Science, Vol.950, pp. 275-286, 1995.
- Bellare, M., Desai, A., Jokipii, E., Rogaway, P, "A Concrete Security Treatment of Symmetric encryption," Proceedings of IEEE Foundations of Computer Science, pp.394-403, 1997.
- Robert W. Fransdonk, "Method and System to Secure Content for Distribution via a Network," United States Patent No.6961858-B2, appl. No.10/321,767, 2005.
- Morin, J. H., Konstantas, D., "Commercialization of Electronic Information," Proceedings of IEEE International Conference on Multimedia Computing and Systems, Vol.2, pp. 524-529, Jul. 1999.
- Schneier, Bruce, Applied Cryptography, Protocols, Algorithms, and Source Code in C, John Wiley & Sons, Inc., (1996), 2nd Edition, pp. 31-32, 2001.
- Schneier, Bruce, Applied Cryptography, Protocols, Algorithms, and Source Code in C, John Wiley & Sons, Inc., Chapters 2 and 3, pp. 21-74, 1996.
- Chae Duck Jung, Weon Shin, Young-jin Hong, and Kyung-hyune Rhee, "Interval Two-Dimensional Hash Chains and Application to a DRM System," Journal of Korea Multimedia Society, Vol.10, No.12, pp.1663-1670, 2007.
- Judge, P. Ammar, M, "Security Issues and Solutions in Multicast Content Distribution: a survey," Proceedings of IEEE on Network Security, pp. 30-36, 2003.
- Cheriton, D. Deering, S, "Host Groups: A Multicast Extension for Datagram Internetworks," Proceedings of the ninth symposium on Data communications, pp.172-79, 1985.
- Deok-Gyu Lee, Hyung-Geun Oh, and In-Young Lee, "A Study on DRM Model Using Electronic Cash System," Journal of Korea Multimedia Society, Vol.7, No.8, pp.1107-1119, 2004.
- Ballardie, T, Crowcroft, J., "Multicast-Specific Security Threats and Counter-Measures," Proceedings of IEEE of Network and DistributedSystem Security, pp. 2-16, 1995.
- Judge, P. Ammar, M, "Gothic: A Group Access Control Architecture for Secure Multicast and Anycast," Proceedings of IEEE Computer and Communications Societies, pp. 1547-1556, 2002.
- Chung Kei Wong. Lam, S.S, "Digital Signatures for Flows and Multicasts," IEEE/ACM Trans. on Networking, pp. 502-513, 1999.
- Rohatgi, P, "A Compact and Fast Hybrid Signature Scheme for Multicast Packet Authentication," Proceedings of the 6th ACM conference on Computer and communications security (CCS '99) , New York, pp.93-100, 1999.
- Canetti, R. Garay, J. Itkis, G. Micciancio, D. Naor, M. Pinkas, B, "Multicast Security: A Taxonomy and Some Efficient Constructions," Proceedings of IEEE Computer and Communications Societies, pp. 708-716, 1999.
- Brown, I., C. Perkins, J. Crowcroft, Watercasting: Distributed Watermarking of Multicast Media, NGC, 1999.
- L Vicisano, L Rizzo and J Crowcroft, "TCP Like Congestion Control for Layered Reliable Multicast Data Transfer," Proceedings of IEEE Infocom Transaction, 1997.
- Ballardie, T., Crowcroft, J., "Multicast- Specific Security Threats and Counter-Measures," Proceedings of IEEE Symposium on Network and Distributed System Security, pp. 2-16, 1995.
- S. Chuang, Jon Crowcroft, S. Hailes, Mark J. Handley, N. Ismail, D. Lewis, I. Wakeman, "Multimedia Application Requirements for Multicast Communications Services," Proceedings of International Networking Conference (INET'93) , Barry Leiner (Ed.), San Francisco, California, pp. 1-9, 1993.
- Jingwen J., Nahrstedt, M, "mc-SPF: An Application- Level Multicast Service Path Finding Protocol for Multimedia Applications," Proceedings of IEEE International Conference on Multimedia and Expo (ICME2002) , Vol.1, pp. 765- 768, 2002.
- Jun Yao, Anjun Zhao, Lei Guo, "A Movel Video Multicast Instant Source Authentication Model Based on Digital Watermarking and TESLA," Proceedings of International Conference on Communication Technology (ICCT 2003) , Vol.2, pp. 1719- 1722, 2003.
- Moyer, M.J., Rao, J.R., Rohatgi, P., "A Survey of Security Issues in Multicast Communications," IEEE Trans. on Network, Vol.13, No.6, pp. 12-23, 1999. https://doi.org/10.1109/65.806981
- Calvin E. Lewis, "Multimedia Communication Management System with Subscriber Message Integration Services," United States Patent Application Publication, 2002.
- Hinard, Y., Bettahar, H., Challal, Y., Bouabdallah, A., "AAA Based Security Architecture for Multicast Content Distribution," Proceedings of International Symposium on Computer Networks, pp. 85-90, 2006.
- Ian Wakeman and Jon Crowcroft, "Multicast Congestion Control in the Distribution of Variable Bit Rate Video," Technical Report of the Computer Science Department, University College London, 1994.
- Daneshpour, N., Abdollahzadeh Barfourosh, "Data Engineering Approach to Efficient Data Warehouse: Life Cycle Development Revisited," Proceedings of International Symposium on Computer Science and Software Engineering (CSSE2011) , pp. 109-120, 2011.
- Roger S. Pressman, Software Engineering A Practioner's Approach, Seventh Edition, McGraw Hill, International Edition, 2010.
Cited by
- An Integrative Method of FTA and FMEA for Software Security Analysis of a Smart Phone vol.2, pp.12, 2013, https://doi.org/10.3745/KTCCS.2013.2.12.541