IP Datacast over DVB-H: Service Purchase and Protection (SPP), DVB, 2006.
OMA BCAST v1.0 enabler Open Mobile Alliance, http://www.openmobilealliance.org/.
Service and Content Protection Specification Open Mobile Alliance, http://www.openmobilealliance.org/.
OMA-DRM-V2_0 enabler :Open Mobile
. http://www.openmobilealliance.org/.
3GPP TS 26.346 : Multimedia broadcast/multicast service (MBMS); protocols and codecs. 3rd Generation Partnership Project, Technical Specification 3GPP TS 26.346, http://www.3gpp.org/.
3GPP TS 33.246 : Security of multimedia broadcast/multicast service. 3rd Generation Partnership Project, Technical Specification 3GPP TS 33.246, http://www.3gpp.org/.
3GPP2 X.S0022 : Broadcast and multicast service in cdma2000 wireless IP network. 3rd Generation Partnership Project 2, Technical Specification 3GPP2 X.S0022, http://www.3gpp2.org/.
3GPP2 S.S0083 : BCMSC security framework. 3rd Generation Partnership Project 2, Technical Specification 3GPP2 S.S0083, http://www.3gpp2.org/.
3GPP TS 33.220 : Generic authentication architecture, generic bootstrapping architecture. 3rd Generation Partnership Project, Technical Specification 3GPP TS 33.220, http://www.3gpp.org/.
3GPP TS 31.102 : Characteristics of the universal subscriber identity module (USIM) application. 3rd Generation Partnership Project, Technical Specification 3GPP TS 31.102, http://www.3gpp.org/.
3GPP2 C.S0023 : Removable user identity module for spread spectrum systems. 3rd Generation Partnership Project 2, Technical Specification 3GPP2 C.S0023, http://www.3gpp2.org/.
Diffie W, Hellman M: New directions in cryptography. IEEE Transactions on Information Theory 1976,22(6):644-654. 10.1109/TIT.1976.1055638
Article
MathSciNet
MATH
Google Scholar
Elgamal T: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 1985,31(4):469-472. 10.1109/TIT.1985.1057074
Article
MathSciNet
MATH
Google Scholar
Miller SP, Neuman BC, Schiller JI, Saltzer JH: Section E.2.1: Kerberos authentication and authorization system. M.I.T. Project Athena, Cambridge, Mass, USA; 1987.
Google Scholar
Conrado C, Kamperman F, Schrijen GJ, Jonker W: Privacy in an identity-based DRM system. Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA '03), September 2003, Prague, Czech Republic 389-395.
Google Scholar
Kalker T, Spasojevic M, Said A, Petruszka A, Shah P, Mclean P: A case for person-centric digital rights management. Proceedings of the IEEE Consumer Communications & Networking Conference, (Workshop on Digital Rights Management Impact on Consumer Communications) (CCNC '05), January 2005, Las Vegas, Nev, USA
Google Scholar
Rescorla E: HTTP over TLS. RFC 2818, http://www.ietf.org/rfc/rfc2818.txt.
3GPP TS 33.110 : Key establishment between a UICC and a terminal. 3rd Generation Partnership Project, Technical Specification 3GPP TS 33.110, http://www.3gpp.org/.
Rivest RL, Shamir A, Adleman L: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 1978,21(2):120-126. 10.1145/359340.359342
Article
MathSciNet
MATH
Google Scholar