Acknowledgement
Supported by : 한국과학재단
References
- "Conditional-Access Broadcasting Systems," ITU Rec., 810, 1992.
- F. Tu, C. Laih, and H. Tung, "On Key Distribution Management for Conditional Access System on Pay-TV System," IEEE Trans. Consumer Electronics, Vol. 45, pp.151-158, February 1999. https://doi.org/10.1109/30.754430
- Y.L. Huang, S. Shieh, F.S. Ho, and J.C. Wang, "Efficient key distribution schemes for secure media delivery in pay-TV systems," IEEE Trans. Multimedia, vol. 6, no. 5, pp. 760-769, October 2004. https://doi.org/10.1109/TMM.2004.834861
- T. Jiang, S. Zheng, and B. Liu, "Key distribution based on hierarchical access control for conditional access system in DTV broadcast," IEEE Trans. Consumer Electronics, vol. 50, no. 1, pp. 225-230, February 2004. https://doi.org/10.1109/TCE.2004.1277866
- B. Liu, W. Zhang, and T. Jiang, "A scalable key distribution scheme for conditional access system in digital pay-TV system," IEEE Trans. Consumer Electronics, vol. 50, no. 2, pp. 632-637, May 2004. https://doi.org/10.1109/TCE.2004.1309442
- H.M. Sun, C.M. Chen, and C.Z. Shieh, "Flexible-Pay-Per-Channel: A new model for content access control in pay-TV broadcasting systems," IEEE Trans. Multimedia, vol. 10, no. 6, pp. 1109-1120, October 2008. https://doi.org/10.1109/TMM.2008.2001381
- C.K. Wong, M. Gouda, and S.S. Lam, "Secure group communications using Key graphs," IEEE/ACM Trans. Networking, vol. 8, pp. 16-30, February 2000. https://doi.org/10.1109/90.836475
- D.M. Wallner, E.J. Harder, and R.C. Agee, "Key management for multicast: Issues and architecutres," RFC 2627, June 1999.
- R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas, "Multicast security: A taxonomy and som efficient constructions," IEEE INFOCOM, vol. 2, pp. 708-716, March 1999.
- A.T. Sherman and D.A. McGrew, "Key establishment in large dynamic groups using one-way function trees," IEEE Trans. Software Engineering, vol. 29, pp. 444-458, May 2003. https://doi.org/10.1109/TSE.2003.1199073
- M. Li, R. Poovendran, and C. Bernstein, "Design of secure multicast key management schemes with communication budget constraint," IEEE Communication Letters, vol. 6, pp. 108-110, March 2002. https://doi.org/10.1109/4234.991148
- M.J. Mihaljevic, "Reconfigurable key management for broadcast encryption," IEEE Communication Letters, vol. 8, pp. 440-442, July 2004. https://doi.org/10.1109/LCOMM.2004.832774
- W.T. Zhu, "Optimizing the tree structure in secure multicast key management," IEEE Communications Letters, vol. 9, no. 5, pp. 477-479, May 2005. https://doi.org/10.1109/LCOMM.2005.1431177
- Q. Kang, X. Meng, and J. Wang, "An optimized LKH scheme based on one-way hash function for secure group communications," IEEE ICCT, November 2006.