References
-
$OpenCable^{TM}$ Specifications: CableCARD Interface 2.0 Specification, CableLabs, OC-SP-CCIF2.0-I19-090904, 2009. - T. Jiang, S. Zheng, and B. Liu, "Key Distribution Based on Hierarchical Access Control for Conditional Access System in DTV Broadcast," IEEE Trans. Consum. Electron., vol. 50, 2004, pp. 225-230. https://doi.org/10.1109/TCE.2004.1277866
- B.M. Macq and J.J. Quisquater, "Cryptology for Digital TV Broadcasting," Proc. IEEE, 1995, pp. 944-957.
- EBU Project Group, "Functional Model of a Conditional Access System," EBU Technical Review, 1995, pp. 64-77.
- F.K. Tu, C.S. Laih, and H.H. Tung, "On Key Distribution Management for Conditional Access System Onpay-TV System," IEEE Trans. Consum. Electron., vol. 45, 1999, pp. 151-158. https://doi.org/10.1109/30.754430
- DCAS Host License Agreement, CableLabs, http://www.opencable.com/downloads/DCAS_New.pdf.
- W.L. Helms, J.B. Carlucci, and J.K. Schnitzer, "Downloadable Security and Protection Methods and Apparatus," in Patent Publication Number: 20080098212; Application Number: 2006- 584208, US, 2006.
- Y. Jeong et al., "A Novel Protocol for Downloadable CAS," IEEE Trans. Consum. Electron., vol. 54, 2008, pp. 1236-1243. https://doi.org/10.1109/TCE.2008.4637612
- M. Borza and A. Hawtin, "The Future of Open Cable Systems: Conditional Access Migrates to DCAS," Information Quarterly, vol. 7, 2008, pp. 60-63.
-
$OpenCable^{TM}$ Specifications: OpenCable Host Device 2.1 Core Functional Requirements, CableLabs, OC-SP-HOST2.1-CFRI08-090508, 2009. - Data-Over-Cable Service Interface Specifications: Radio Frequency Interface Specification, CableLabs, CM-SP-RFIv2.0- C02-090422, 2009.
- S.H. Weingart, "Physical Security Devices for Computer Subsystems: A Survey of Attacks and Defenses," Lecture Notes in Computer Science, 2000, pp. 302-317.
- Security Requirement for Cryptographic Modules: NIST, FIPS PUB 140-2, 2001.
- "Common Criteria for Information Technology Security Evaluation," ver. 2.1, Technical Report, http://www. commoncriteria.org/docs/index.html, 1999.
- Next Generation Network Architecture Plan: NGNA LLC, 2004.
- C. Boyd and A. Mathuria, Protocols for Authentication and Key Establishment, Springer: Berlin, 2003.
- Infineon, http://www.infineon.com.
Cited by
- 서로 다른 DCAS 간 효율적 상호운용을 위한 키 생성 및 관리 기법 vol.2, pp.2, 2010, https://doi.org/10.3745/ktccs.2013.2.2.075