User Authentication Mechanism for using a Secure IPTV Service in Mobile Device |
Jeong, Yoon-Su
(충북대학교 전자계산학과 네트워크보안 연구실)
Kim, Yong-Tae (한남대학교 멀티미디어공학부) Park, Gil-Cheol (한남대학교 멀티미디어공학부) Lee, Sang-Ho (충북대학교 전기전자컴퓨터공학부) |
1 | A. Fiat and M. Naor, 'Broadcast encryption', in Advances in Cryptology - CRYPTO'93, 1994, vol. 773, pp. 480-491 DOI |
2 | R. Canetti, J. Garey, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas, 'Multicast security: A taxonomy and some efficient constructions', in Proc. IEEE Infocomm'99, Mar. 1999, vol. 2, pp. 708-716 |
3 | S. Emmanuel and M. S. Kankanhalli, 'A Digital rights management scheme for broadcast video', multimedia Syst. J., vol. 8, no. 6, pp. 444-458, 2003 DOI ScienceOn |
4 | Y. L. Huang and S. Shieh, 'Efficient key distribution scheme for secure media delivery in pay-TV systems', IEEE Trans. Multimedia, vol. 6, no. 5, pp. 760-769, Oct. 2004 DOI ScienceOn |
5 | H. Harney and E. Harder, 'Logical Key Hierarchy Protocol', IETF 1999[Online]. Availaber: Internet Draft, draft-harney-sparta-lkhp-\sec-00.txt |
6 | D. Naor, M. Naor and J. B. Lotspiech, 'Revocation and tracing schemes for stateless receivers', in Advances in Cryptology - CRYPTO'01, 2001, vol. 2139, LNCS, pp. 41-62 |
7 | D. Halevy and A. Shamir, 'The LSD broadcast encryption scheme', in Proc. CRYPTO 2002, 2002, vol 2442, LNCS, pp. 47-60 |
8 | B. Rosenblatt, B. Trippe, and S. Mooney, 'Digital Rights Management-Business and Technology', M&T Books, 2002 |
9 | F. K. Tu, C. S. Laih, and S. H. Toung, 'On key distribution management for conditional access system on pay-TV system,' IEEE Trans. Consumer Electron., vol, 45, no. 1, pp. 151-158, Feb, 1999 DOI ScienceOn |
10 | J. Lyu et al., 'Design of Open APIs for Personaled IPTV Service', Proceedings of 9th Internaltional Conference on Advanced Communication Technology, Vol. 1, Feb. 2007, pp. 305-310 |
11 | A. T. Sherman and D. A. McGrew, 'Key establishment in large dynamic groups using one-way functions trees', IEEE Trans. Softw. Eng., vol. 29, no. 5, pp. 444-458, May 2003 DOI ScienceOn |
12 | J. W. Lee, 'Key distribution and management for conditional access system on DBS', in Proc. Int. Conf. Cryptology and Information Security, 1996, pp. 82-86 |
13 | A. M. Eskicioglu, 'Protecting Intellectual Property in Digital Multimedia Networks,' IEEE Computer, Vol. 36, pp. 39-45, 2003 |
14 | D. Wallner, E. Harder, and R. Agee, 'Key Management for Multicast: Issues and Architectures IETF', 1999, RFC 2627 |