Application of Trusted Computing to Secure Video Broadcasts to Mobile Receivers. / Gallery, Eimear; Tomlinson, Allan; Delicata, Rob.

2005.

Research output: Working paper

Unpublished

Abstract

This paper addresses the problem of configuring mobile devices to receive broadcast services protected by legacy conditional access systems. The protocols apply the concepts of trusted computing to allow a mobile host to demonstrate that it is secure, before any application or associated keys are securely downloaded. Thus the protocols are applicable anywhere a secure download is required. A general analysis of the security of the protocols is presented, followed by the results of formal verification.
Original languageUndefined/Unknown
Publication statusUnpublished - 1 Jun 2005
This open access research output is licenced under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License.

ID: 4661393