STREAMTO: Streaming Content using a Tamper-Resistant Token

Jieyin Cheng, Cheun Ngen Chong, Jeroen M. Doumen, Sandro Etalle, Pieter H. Hartel, Stefan Nikolaus

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    2 Citations (Scopus)
    296 Downloads (Pure)

    Abstract

    StreamTo uses tamper resistant hardware tokens to generate the key stream needed to decrypt encrypted streaming music. The combination of a hardware token and streaming media effectively brings tried and tested PayTV technology to the Internet. We provide a security analysis and present two prototype implementations with a performance assessment, showing that the system is both effective and efficient.
    Original languageEnglish
    Title of host publicationSecurity and Privacy in the Age of Ubiquitous Computing
    Subtitle of host publicationIFIP TC11 20th International Information Security Conference, May 30 - June 1, 2005, Chiba, Japan
    EditorsRyoichi Sasaki, Sihan Qing, Eiji Okamoto, Hiroshi Yoshiura
    Place of PublicationNew York, NY
    PublisherSpringer
    Pages601-612
    Number of pages12
    ISBN (Electronic)978-0-387-25660-3
    ISBN (Print)978-1-4419-3819-0
    DOIs
    Publication statusPublished - May 2005
    EventIFIP TC11 20th International Information Security Conference - Chiba, Japan
    Duration: 30 May 20051 Jun 2005

    Publication series

    NameIFIP Advances in Information and Communication Technology
    PublisherSpringer
    Volume181
    ISSN (Print)1868-4238
    ISSN (Electronic)1868-422X

    Other

    OtherIFIP TC11 20th International Information Security Conference
    Period30/05/051/06/05
    OtherMay 30 - June 1, 2005

    Keywords

    • SCS-Cybersecurity

    Fingerprint

    Dive into the research topics of 'STREAMTO: Streaming Content using a Tamper-Resistant Token'. Together they form a unique fingerprint.

    Cite this