STREAMTO: Streaming Content using a Tamper-Resistant Token

Jieyin Cheng, Cheun Ngen Chong, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Stefan Nikolaus

    Research output: Book/ReportReportOther research output

    293 Downloads (Pure)

    Abstract

    StreamTo uses tamper resistant hardware tokens to generate the key stream needed to decrypt encrypted streaming music. The combination of a hardware token and steaming media effectively brings tried and tested PayTV technology to the Internet. We provide a security analysis and present two prototype implementations with a performance assessment, showing that the system is both effective and efficient.
    Original languageEnglish
    Place of PublicationEnschede
    PublisherCentre for Telematics and Information Technology (CTIT)
    Number of pages18
    Publication statusPublished - Nov 2004

    Publication series

    NameCTIT technical reports series
    PublisherUniversity of Twente, Centre for Telematics and Information Technology (CTIT)
    No.TR-CTIT-04-47
    ISSN (Print)1381-3625

    Keywords

    • SCS-Cybersecurity

    Fingerprint

    Dive into the research topics of 'STREAMTO: Streaming Content using a Tamper-Resistant Token'. Together they form a unique fingerprint.
    • STREAMTO: Streaming Content using a Tamper-Resistant Token

      Cheng, J., Chong, C. N., Doumen, J. M., Etalle, S., Hartel, P. H. & Nikolaus, S., May 2005, Security and Privacy in the Age of Ubiquitous Computing: IFIP TC11 20th International Information Security Conference, May 30 - June 1, 2005, Chiba, Japan. Sasaki, R., Qing, S., Okamoto, E. & Yoshiura, H. (eds.). New York, NY: Springer, p. 601-612 12 p. (IFIP Advances in Information and Communication Technology; vol. 181).

      Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

      Open Access
      File
      2 Citations (Scopus)
      300 Downloads (Pure)

    Cite this