Author:
Varalakshmi R.,Uthariaraj V. Rhymend
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference21 articles.
1. Akl SG, Taylor PD (1982) Cryptographic solution to a multilevel security problem. Proc. Crypto-82, Santa Barbara, CA, August 23–25, pp 237–250
2. Antequera N, Loperz-Ramos JA (2011) Remarks and countermeasures on a cryptoanalysis of a secure multicast protocol. Proceedings of 7th International Conference on Next Generation Web Services Practices, Salamanca 2011, Salamanca (Spain) 201–205
3. Chan KC, Chan SHG (2003) Key management approaches to offer data confidentiality for secure multicast. IEEE Netw 17(5):30–39
4. Conditional Access Broadcasting Systems (1992) ITU-R Rec. 810
5. EBU Project Group B/CA (1995) Functional model of a conditional access system. EBU Tech Rev, pp. 64–77, Winter
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献