Establishing a Key Hierarchy for Conditional Access without Encryption.

Jörg Schwenk,

Proc. IFIP Communications and Multimedia Security 1996, Chapman & Hall, London.

Tags: conditional-access, encryption, ifip, key-hierarchy