1. ARRIS (2015) Joint Statement on DSTAC Report. Available at
http://apps.fcc.gov/ecfs/comment/view?id=60001099145
, retrieved 04/25/16
2. Asghar MN, Ghanbari M (2012) MIKEY for keys management of H.264 scalable video coded layers. J King Saud Univ – Comput Inform Sci 24(2):107–116
3. Asghar MN, Fleury M, Ghanbari M (2012) Key management protocols for secure wireless multimedia services: a review. Recent Patents on Telecommunications 1(1):41–53
4. Asghar MN, Ghanbari M, Fleury M, Reed MJ (2014a) Sufficient encryption based on entropy coding syntax elements of H.264/SVC. Multimedia Tools and Applications,
http://link.springer.com/article/10.1007%2Fs11042-014-2160-6
Accessed 30th Sept. 2015
5. Asghar MN, Ghanbari M, Fleury M, Reed MJ (2014b) Confidentiality of a selectively encrypted H.264 coded video bit-stream. J Vis Commun Image Represent 25(2):487–498