StreamTo : streaming content using a tamper-resistant token

J. Cheng, C.N. Chong, J.M. Doumen, S. Etalle, P.H. Hartel, S. Nikolaus

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    2 Citations (Scopus)

    Abstract

    Stream To uses a tamper resistant hardware token to generate the key stream needed to decrypt encrypted streaming music. The combination of a hardware token and streaming media effectively brings tried and tested Pay-TV technology to the Internet. We present two prototype implementations with a performance assessment, showing that the system is both effective and efficient.
    Original languageEnglish
    Title of host publicationSecurity and Privacy in the Age of Ubiquitous Computing (Proceedings IFIP TC11 20th International Conference on Information Security, SEC 2005, Chiba, Japan, May 30-June 1, 2005)
    EditorsR. Sasaki, S. Qing, E. Okamoto, H. Yoshiura
    Place of PublicationBerlin
    PublisherSpringer
    Pages601-612
    ISBN (Print)0-387-25658-X
    DOIs
    Publication statusPublished - 2005

    Publication series

    NameIFIP Conference Proceedings
    Volume181
    ISSN (Print)1571-5736

    Fingerprint

    Dive into the research topics of 'StreamTo : streaming content using a tamper-resistant token'. Together they form a unique fingerprint.

    Cite this