{"id":"https://openalex.org/W1483215164","doi":"https://doi.org/10.1007/978-3-540-73547-2_6","title":"Cryptanalysis of BGW Broadcast Encryption Schemes for DVD Content Protection","display_name":"Cryptanalysis of BGW Broadcast Encryption Schemes for DVD Content Protection","publication_year":2007,"publication_date":"2007-08-11","ids":{"openalex":"https://openalex.org/W1483215164","doi":"https://doi.org/10.1007/978-3-540-73547-2_6","mag":"1483215164"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-540-73547-2_6","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-73547-2_6","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022955566","display_name":"Qianhong Wu","orcid":"https://orcid.org/0000-0002-6407-4194"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Qianhong Wu","raw_affiliation_strings":["Centre for Computer and Information Security Research, University of Wollongong, Wollongong NSW 2522, Australia"],"affiliations":[{"raw_affiliation_string":"Centre for Computer and Information Security Research, University of Wollongong, Wollongong NSW 2522, Australia","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054741725","display_name":"Willy Susilo","orcid":"https://orcid.org/0000-0002-1562-5105"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Willy Susilo","raw_affiliation_strings":["Centre for Computer and Information Security Research, University of Wollongong, Wollongong NSW 2522, Australia"],"affiliations":[{"raw_affiliation_string":"Centre for Computer and Information Security Research, University of Wollongong, Wollongong NSW 2522, Australia","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008178136","display_name":"Yi Mu","orcid":"https://orcid.org/0000-0002-1637-845X"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yi Mu","raw_affiliation_strings":["Centre for Computer and Information Security Research, University of Wollongong, Wollongong NSW 2522, Australia"],"affiliations":[{"raw_affiliation_string":"Centre for Computer and Information Security Research, University of Wollongong, Wollongong NSW 2522, Australia","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111808632","display_name":"Bo Qin","orcid":"https://orcid.org/0000-0001-6015-7788"},"institutions":[{"id":"https://openalex.org/I4210131919","display_name":"Xi'an University of Technology","ror":"https://ror.org/038avdt50","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210131919"]},{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bo Qin","raw_affiliation_strings":["Department of Mathematics, School of Science, Xi\u2019an University of Technology, Xi\u2019an, China","National Key Laboratory of Integrated Service Networks, Xidian University, Xi\u2019an, China","National Key Laboratory of Integrated Service Networks, Xidian University, Xi'an, China","Department of Mathematics, School of Science, Xi'an University of Technology, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics, School of Science, Xi\u2019an University of Technology, Xi\u2019an, China","institution_ids":["https://openalex.org/I4210131919"]},{"raw_affiliation_string":"National Key Laboratory of Integrated Service Networks, Xidian University, Xi\u2019an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"National Key Laboratory of Integrated Service Networks, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"Department of Mathematics, School of Science, Xi'an University of Technology, Xi'an, China","institution_ids":["https://openalex.org/I4210131919"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5022955566"],"corresponding_institution_ids":["https://openalex.org/I204824540"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.2284,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.49814771,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"32","last_page":"41"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8545363545417786},{"id":"https://openalex.org/keywords/broadcast-encryption","display_name":"Broadcast encryption","score":0.7253994345664978},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6439992785453796},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6031116843223572},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.545198917388916},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.47156473994255066},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4416981637477875},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.434316486120224},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3699159324169159}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8545363545417786},{"id":"https://openalex.org/C2778281673","wikidata":"https://www.wikidata.org/wiki/Q4972106","display_name":"Broadcast encryption","level":4,"score":0.7253994345664978},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6439992785453796},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6031116843223572},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.545198917388916},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.47156473994255066},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4416981637477875},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.434316486120224},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3699159324169159}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/978-3-540-73547-2_6","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-73547-2_6","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:ro.uow.edu.au:infopapers-10431","is_oa":false,"landing_page_url":"https://ro.uow.edu.au/infopapers/3095","pdf_url":null,"source":{"id":"https://openalex.org/S4306400510","display_name":"Research Online (University of Wollongong)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I204824540","host_organization_name":"University of Wollongong","host_organization_lineage":["https://openalex.org/I204824540"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Faculty of Informatics - Papers (Archive)","raw_type":"presentation"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5799999833106995}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1495266644","https://openalex.org/W1507575253","https://openalex.org/W1508689723","https://openalex.org/W1522268755","https://openalex.org/W1532836984","https://openalex.org/W1559498407","https://openalex.org/W1793265733","https://openalex.org/W1905774212","https://openalex.org/W2152924492","https://openalex.org/W2168571148","https://openalex.org/W2344269074","https://openalex.org/W2477011922","https://openalex.org/W2480498986","https://openalex.org/W2490195800","https://openalex.org/W2497843319","https://openalex.org/W2914756988","https://openalex.org/W3022078572","https://openalex.org/W3030091766","https://openalex.org/W3101438646","https://openalex.org/W4238634196"],"related_works":["https://openalex.org/W1604915031","https://openalex.org/W3089223619","https://openalex.org/W4288849478","https://openalex.org/W2940752727","https://openalex.org/W1565942289","https://openalex.org/W1561797008","https://openalex.org/W2516549250","https://openalex.org/W767161385","https://openalex.org/W1553510179","https://openalex.org/W2991189023"],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
