Content and Key Management to Trace Traitors in Broadcasting Services.
Kazuto OgawaGoichiro HanaokaHideki ImaiPublished in: STM (2015)
Keyphrases
- key management
- security services
- ad hoc networks
- wireless sensor networks
- web services
- key management scheme
- resource constrained
- group communication
- key distribution
- content providers
- security protocols
- security threats
- multimedia
- mobile networks
- provably secure
- service providers
- identity based cryptography
- secret key
- elliptic curve
- digital signature
- multimedia content
- key establishment
- computing environments
- context aware