1. AACS: Advanced Access Content System, http://www.aacsla.com .
2. Asano T.: A revocation scheme with minimal storage at receivers. In: Zheng Y. (ed.) ASIACRYPT. Lecture Notes in Computer Science, vol. 2501, pp. 433–450. Springer, New York (2002).
3. Attrapadung N., Kobara K., Imai H.: Sequential key derivation patterns for broadcast encryption and key predistribution schemes. In: Laih, C.-S. (ed.) ASIACRYPT. Lecture Notes in Computer Science, vol. 2894, pp. 374–391. Springer, New York (2003)
4. Austrin P., Kreitz G.: Lower bounds for subset cover based broadcast encryption. In: Vaudenay, S. (ed) AFRICACRYPT. Lecture Notes in Computer Science, vol. 5023, pp. 343–356. Springer, New York (2008)
5. Berkovits S.: How to broadcast a secret. In: Davies, D.W. (ed) EUROCRYPT. Lecture Notes in Computer Science, vol. 547, pp. 535–541. Springer, New York (1991)