Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,434,864 papers from all fields of science
Search
Sign In
Create Free Account
Broadcast encryption
Known as:
Revocation scheme
Broadcast encryption is the cryptographic problem of delivering encrypted content (e.g. TV programs or data on DVDs) over a broadcast channel in such…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
21 relations
Advanced Access Content System
Algorithm
Amos Fiat
Attribute-based encryption
Expand
Broader (2)
Copy protection
Digital rights management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
An Efficient Compromised Node Revocation Scheme in Fog-Assisted Vehicular Crowdsensing
Sultan Basudan
,
Xiaodong Lin
,
K. Sankaranarayanan
Global Communications Conference
2017
Corpus ID: 1207248
In this paper, we propose an efficient compromised node revocation scheme for enhancing security in road surface condition…
Expand
2016
2016
AccConF: An Access Control Framework for Leveraging In-Network Cached Data in ICNs
S. Misra
,
R. Tourani
,
Francisco Natividad
,
Travis Mick
,
N. Majd
,
Hong Huang
arXiv.org
2016
Corpus ID: 1218667
The fast-growing Internet traffic is increasingly becoming content-based and driven by mobile users, with users more interested…
Expand
2014
2014
A Novel Hybrid Key Revocation Scheme for Wireless Sensor Networks
Mengmeng Ge
,
Kim-Kwang Raymond Choo
International Conference on Network and System…
2014
Corpus ID: 36127834
As sensor nodes are deployed in an open and hostile environment, they are vulnerable to various attacks. It is of critical…
Expand
2013
2013
Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems
Ayad F. Barsoum
,
M. Hasan
2013
Corpus ID: 14075967
Currently, the amount of sensitive data produced by many organizations is outpacing their storage ability. The management of such…
Expand
2013
2013
Improving resilience and revocation by mitigating bad mouthing attacks in Wireless Sensor Networks
Dr K.Vijaya
,
M.Selvam
2013
Corpus ID: 17785728
— Sensor networks can be deployed in hostile environments where adversaries may be present. Since wireless sensor networks…
Expand
2010
2010
Wireless broadcast encryption based on smart cards
X. Yi
,
L. Batten
Wirel. Networks
2010
Corpus ID: 12781536
Wireless broadcasting is an efficient way to broadcast data to a large number of users. Some commercial applications of wireless…
Expand
2007
2007
Security evaluation of certain broadcast encryption schemes employing a generalized time-memory-data trade-off
M. Mihaljević
,
M. Fossorier
,
H. Imai
IEEE Communications Letters
2007
Corpus ID: 41048716
In this letter a weakness of certain broadcast encryption schemes in which the protected delivery of a session key (SEK) is based…
Expand
2007
2007
Birthday Paradox Based Security Analysis of Certain Broadcast Encryption Schemes
M. Mihaljević
,
M. Fossorier
,
H. Imai
IEICE Transactions on Fundamentals of Electronics…
2007
Corpus ID: 43330185
This letter yields a security evaluation of certain broadcast encryption (BE) schemes regarding the generic vulnerability of the…
Expand
2006
2006
NIS01-5: A Novel Voting Mechanism for Compromised Node Revocation in Wireless Ad Hoc Networks
Xiaodong Lin
,
Haojin Zhu
,
B. Lin
,
P. Ho
,
Xuemin Shen
IEEE Globecom
2006
Corpus ID: 39239010
Due to the nature of wireless ad hoc networks such as dynamic infrastructure and non-centralized management, the routing process…
Expand
2004
2004
Reconfigurable key management for broadcast encryption
M. Mihaljević
IEEE Communications Letters
2004
Corpus ID: 314864
A novel approach for the cryptographic keys management in the broadcasting scenario with a conditional access control is proposed…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE