Application of Trusted Computing to Secure Video Broadcasts to Mobile Receivers. / Gallery, Eimear; Tomlinson, Allan; Delicata, Rob.

2005.

Research output: Working paper

Unpublished

Standard

Application of Trusted Computing to Secure Video Broadcasts to Mobile Receivers. / Gallery, Eimear; Tomlinson, Allan; Delicata, Rob.

2005.

Research output: Working paper

Harvard

APA

Vancouver

Author

BibTeX

@techreport{ebfd03c908fb4852b03232578b7e2859,
title = "Application of Trusted Computing to Secure Video Broadcasts to Mobile Receivers",
abstract = "This paper addresses the problem of configuring mobile devices to receive broadcast services protected by legacy conditional access systems. The protocols apply the concepts of trusted computing to allow a mobile host to demonstrate that it is secure, before any application or associated keys are securely downloaded. Thus the protocols are applicable anywhere a secure download is required. A general analysis of the security of the protocols is presented, followed by the results of formal verification.",
author = "Eimear Gallery and Allan Tomlinson and Rob Delicata",
note = "(submitted to IEEE Trans. on Vehicular Technology)",
year = "2005",
month = jun,
day = "1",
language = "Undefined/Unknown",
type = "WorkingPaper",

}

RIS

TY - UNPB

T1 - Application of Trusted Computing to Secure Video Broadcasts to Mobile Receivers

AU - Gallery, Eimear

AU - Tomlinson, Allan

AU - Delicata, Rob

N1 - (submitted to IEEE Trans. on Vehicular Technology)

PY - 2005/6/1

Y1 - 2005/6/1

N2 - This paper addresses the problem of configuring mobile devices to receive broadcast services protected by legacy conditional access systems. The protocols apply the concepts of trusted computing to allow a mobile host to demonstrate that it is secure, before any application or associated keys are securely downloaded. Thus the protocols are applicable anywhere a secure download is required. A general analysis of the security of the protocols is presented, followed by the results of formal verification.

AB - This paper addresses the problem of configuring mobile devices to receive broadcast services protected by legacy conditional access systems. The protocols apply the concepts of trusted computing to allow a mobile host to demonstrate that it is secure, before any application or associated keys are securely downloaded. Thus the protocols are applicable anywhere a secure download is required. A general analysis of the security of the protocols is presented, followed by the results of formal verification.

M3 - Working paper

BT - Application of Trusted Computing to Secure Video Broadcasts to Mobile Receivers

ER -