STREAMTO: Streaming Content using a Tamper-Resistant Token

Jieyin Cheng, Cheun Ngen Chong, Jeroen M. Doumen, Sandro Etalle, Pieter H. Hartel, Stefan Nikolaus

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    2 Citations (Scopus)
    296 Downloads (Pure)


    StreamTo uses tamper resistant hardware tokens to generate the key stream needed to decrypt encrypted streaming music. The combination of a hardware token and streaming media effectively brings tried and tested PayTV technology to the Internet. We provide a security analysis and present two prototype implementations with a performance assessment, showing that the system is both effective and efficient.
    Original languageEnglish
    Title of host publicationSecurity and Privacy in the Age of Ubiquitous Computing
    Subtitle of host publicationIFIP TC11 20th International Information Security Conference, May 30 - June 1, 2005, Chiba, Japan
    EditorsRyoichi Sasaki, Sihan Qing, Eiji Okamoto, Hiroshi Yoshiura
    Place of PublicationNew York, NY
    Number of pages12
    ISBN (Electronic)978-0-387-25660-3
    ISBN (Print)978-1-4419-3819-0
    Publication statusPublished - May 2005
    EventIFIP TC11 20th International Information Security Conference - Chiba, Japan
    Duration: 30 May 20051 Jun 2005

    Publication series

    NameIFIP Advances in Information and Communication Technology
    ISSN (Print)1868-4238
    ISSN (Electronic)1868-422X


    OtherIFIP TC11 20th International Information Security Conference
    OtherMay 30 - June 1, 2005


    • SCS-Cybersecurity


    Dive into the research topics of 'STREAMTO: Streaming Content using a Tamper-Resistant Token'. Together they form a unique fingerprint.

    Cite this