{"id":"https://openalex.org/W2103945386","doi":"https://doi.org/10.1109/wcnc.2012.6214238","title":"Hybrid multimedia broadcast encryption schemes","display_name":"Hybrid multimedia broadcast encryption schemes","publication_year":2012,"publication_date":"2012-04-01","ids":{"openalex":"https://openalex.org/W2103945386","doi":"https://doi.org/10.1109/wcnc.2012.6214238","mag":"2103945386"},"language":"en","primary_location":{"id":"doi:10.1109/wcnc.2012.6214238","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcnc.2012.6214238","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE Wireless Communications and Networking Conference (WCNC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102008970","display_name":"Tao Li","orcid":"https://orcid.org/0000-0003-4564-5753"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Tao Li","raw_affiliation_strings":["School of Electrical & Electronic Engineering, Nanyang Technological University, Singapore","School of Electrical & Electronic Engineering , Nanyang Technological University , Singapore"],"affiliations":[{"raw_affiliation_string":"School of Electrical & Electronic Engineering, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]},{"raw_affiliation_string":"School of Electrical & Electronic Engineering , Nanyang Technological University , Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071022377","display_name":"Huaqun Guo","orcid":"https://orcid.org/0000-0001-6753-6537"},"institutions":[{"id":"https://openalex.org/I3005327000","display_name":"Institute for Infocomm Research","ror":"https://ror.org/053rfa017","country_code":"SG","type":"facility","lineage":["https://openalex.org/I115228651","https://openalex.org/I3005327000","https://openalex.org/I91275662"]},{"id":"https://openalex.org/I115228651","display_name":"Agency for Science, Technology and Research","ror":"https://ror.org/036wvzt09","country_code":"SG","type":"government","lineage":["https://openalex.org/I115228651"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Huaqun Guo","raw_affiliation_strings":["Cryptography & Security Dept., Institute for Infocomm Research A*STAR, Singapore","Cryptography & Security Department, Institute for Infocomm Research, A\u2217STAR, Singapore"],"affiliations":[{"raw_affiliation_string":"Cryptography & Security Dept., Institute for Infocomm Research A*STAR, Singapore","institution_ids":["https://openalex.org/I3005327000","https://openalex.org/I115228651"]},{"raw_affiliation_string":"Cryptography & Security Department, Institute for Infocomm Research, A\u2217STAR, Singapore","institution_ids":["https://openalex.org/I3005327000","https://openalex.org/I115228651"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071592220","display_name":"Maode Ma","orcid":"https://orcid.org/0000-0003-1438-7018"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Maode Ma","raw_affiliation_strings":["School of Electrical & Electronic Engineering, Nanyang Technological University, Singapore","School of Electrical & Electronic Engineering , Nanyang Technological University , Singapore"],"affiliations":[{"raw_affiliation_string":"School of Electrical & Electronic Engineering, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]},{"raw_affiliation_string":"School of Electrical & Electronic Engineering , Nanyang Technological University , Singapore","institution_ids":["https://openalex.org/I172675005"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5102008970"],"corresponding_institution_ids":["https://openalex.org/I172675005"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.16210957,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2139","issue":null,"first_page":"2598","last_page":"2602"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9915000200271606,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/header","display_name":"Header","score":0.8947348594665527},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8376109004020691},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6979230642318726},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6449936628341675},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6218196749687195},{"id":"https://openalex.org/keywords/revocation","display_name":"Revocation","score":0.563487708568573},{"id":"https://openalex.org/keywords/broadcast-encryption","display_name":"Broadcast encryption","score":0.5074126124382019},{"id":"https://openalex.org/keywords/quality-of-service","display_name":"Quality of service","score":0.471646249294281},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.45730167627334595},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.32331961393356323},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.28897514939308167},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2528042793273926},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08099153637886047}],"concepts":[{"id":"https://openalex.org/C48105269","wikidata":"https://www.wikidata.org/wiki/Q1141160","display_name":"Header","level":2,"score":0.8947348594665527},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8376109004020691},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6979230642318726},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6449936628341675},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6218196749687195},{"id":"https://openalex.org/C2775892892","wikidata":"https://www.wikidata.org/wiki/Q6509517","display_name":"Revocation","level":3,"score":0.563487708568573},{"id":"https://openalex.org/C2778281673","wikidata":"https://www.wikidata.org/wiki/Q4972106","display_name":"Broadcast encryption","level":4,"score":0.5074126124382019},{"id":"https://openalex.org/C5119721","wikidata":"https://www.wikidata.org/wiki/Q220501","display_name":"Quality of service","level":2,"score":0.471646249294281},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.45730167627334595},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.32331961393356323},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.28897514939308167},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2528042793273926},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08099153637886047},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/wcnc.2012.6214238","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcnc.2012.6214238","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE Wireless Communications and Networking Conference (WCNC)","raw_type":"proceedings-article"},{"id":"pmh:oai:dr.ntu.edu.sg:10356/100639","is_oa":false,"landing_page_url":"http://hdl.handle.net/10220/16495","pdf_url":null,"source":{"id":"https://openalex.org/S4306402609","display_name":"DR-NTU (Nanyang Technological University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I172675005","host_organization_name":"Nanyang Technological University","host_organization_lineage":["https://openalex.org/I172675005"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Conference Paper"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.5600000023841858,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W97736718","https://openalex.org/W1995233806","https://openalex.org/W2168571148","https://openalex.org/W2914756988","https://openalex.org/W6609405457","https://openalex.org/W6721411451"],"related_works":["https://openalex.org/W2171597999","https://openalex.org/W2600062742","https://openalex.org/W2189136227","https://openalex.org/W2407999481","https://openalex.org/W2762876675","https://openalex.org/W2949595892","https://openalex.org/W1582991288","https://openalex.org/W2000514475","https://openalex.org/W2030668447","https://openalex.org/W3029969753"],"abstract_inverted_index":{"Broadcast":[0],"encryption":[1],"in":[2,53,79],"a":[3,9],"pay":[4],"television":[5],"system":[6],"is":[7,39,49],"actually":[8],"key":[10,15,90],"management":[11],"issue,":[12],"where":[13],"smaller":[14],"storage":[16,91],"and":[17,46,92,97],"shorter":[18],"header":[19],"length":[20],"are":[21,99],"required":[22],"to":[23,74,83,101],"assure":[24],"the":[25,40,47,50,68,71,76,80,85,88,103,106],"quality":[26],"of":[27,70,87,105],"service.":[28],"The":[29],"existing":[30],"solutions":[31],"come":[32],"up":[33],"with":[34],"two":[35,63,72],"typical":[36],"structures.":[37],"One":[38],"matrix-based":[41,81],"structure":[42,52,82],"without":[43],"revocation":[44,77],"capability":[45],"other":[48],"tree-based":[51],"Advanced":[54],"Access":[55],"Content":[56],"System.":[57],"In":[58],"this":[59],"paper,":[60],"we":[61],"propose":[62],"promising":[64],"schemes":[65],"that":[66],"exploit":[67],"combination":[69],"structures":[73],"solve":[75],"problem":[78],"meet":[84],"requirements":[86],"small":[89],"short":[93],"header.":[94],"Mathematical":[95],"derivations":[96],"calculations":[98],"performed":[100],"prove":[102],"feasibility":[104],"proposed":[107],"schemes.":[108]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
