Es­ta­blis­hing a Key Hier­ar­chy for Con­di­tio­nal Ac­cess wi­thout En­cryp­ti­on.

Jörg Schwenk,

Proc. IFIP Com­mu­ni­ca­ti­ons and Mul­ti­me­dia Se­cu­ri­ty 1996, Ch­ap­man & Hall, Lon­don.

Tags: con­di­tio­nal-ac­cess, en­cryp­ti­on, ifip, key-hier­ar­chy