@inproceedings{762ed4a1aeed4664b5b6992a4af99577,
title = "StreamTo : streaming content using a tamper-resistant token",
abstract = "Stream To uses a tamper resistant hardware token to generate the key stream needed to decrypt encrypted streaming music. The combination of a hardware token and streaming media effectively brings tried and tested Pay-TV technology to the Internet. We present two prototype implementations with a performance assessment, showing that the system is both effective and efficient.",
author = "J. Cheng and C.N. Chong and J.M. Doumen and S. Etalle and P.H. Hartel and S. Nikolaus",
year = "2005",
doi = "10.1007/0-387-25660-1_40",
language = "English",
isbn = "0-387-25658-X",
series = "IFIP Conference Proceedings",
publisher = "Springer",
pages = "601--612",
editor = "R. Sasaki and S. Qing and E. Okamoto and H. Yoshiura",
booktitle = "Security and Privacy in the Age of Ubiquitous Computing (Proceedings IFIP TC11 20th International Conference on Information Security, SEC 2005, Chiba, Japan, May 30-June 1, 2005)",
address = "Germany",
}