{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:17:33Z","timestamp":1725887853313},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319504988"},{"type":"electronic","value":"9783319505008"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-50500-8_6","type":"book-chapter","created":{"date-parts":[[2017,5,18]],"date-time":"2017-05-18T07:14:46Z","timestamp":1495091686000},"page":"155-171","source":"Crossref","is-referenced-by-count":0,"title":["Security for Video Broadcasting"],"prefix":"10.1007","author":[{"given":"Allan","family":"Tomlinson","sequence":"first","affiliation":[]},{"given":"Sheila","family":"Cobourne","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,19]]},"reference":[{"key":"6_CR1","unstructured":"ISO\/IEC, \u201cInformation Technology \u2013 Generic Coding of Moving Pictures and Associated Audio: Audio,\u201d International Standard ISO\/IEC 13818-3, International Organization for Standardization (ISO), Geneva, Switzerland, 1994."},{"key":"6_CR2","unstructured":"ISO\/IEC, \u201cInformation Technology \u2013 Generic Coding of Moving Pictures and Associated Audio: Video,\u201d International Standard ISO\/IEC 13818-2, International Organization for Standardization (ISO), Geneva, Switzerland, 1995."},{"key":"6_CR3","unstructured":"ISO\/IEC, \u201cInformation Technology \u2013 Generic Coding of Moving Pictures and Associated Audio: Systems,\u201d International Standard ISO\/IEC 13818-1, International Organization for Standardization (ISO), Geneva, Switzerland, 1995."},{"key":"6_CR4","unstructured":"ETSI, \u201cDigital Video Broadcasting (DVB); Support for use of Scrambling and Conditional Access (CA) within Digital Broadcasting Systems,\u201d ETSI Technical Report ETR 289, European Telecommunications Standards Institute (ETSI), Sophia Antipolis, France, Oct. 1996: available at \nhttp:\/\/www.etsi.org\/deliver\/etsi_etr\/200_299\/289\/01_60\/etr_289e01p.pdf\n\n accessed June 2016"},{"key":"6_CR5","unstructured":"ETSI, \u201cDigital Video Broadcasting (DVB); Support for use of the DVB Scrambling Algorithm version 3 within Digital Broadcasting Systems,\u201d ETSI Technical Specification ETSI TS 100 289 V1.1.1 (2011-09), European Telecommunications Standards Institute (ETSI), Sophia Antipolis, France, 2011: available at \nhttp:\/\/www.etsi.org\/deliver\/etsi_ts\/100200_100299\/100289\/01.01.01_60\/ts_100289v010101p.pdf\n\n accessed June 2016"},{"key":"6_CR6","unstructured":"CENELEC, \u201cCommon Interface Specification for Conditional Access and other Digital Video Broadcasting Decoder Applications,\u201d CENELEC Standard 50221, European Committee for Electrotechnical Standardization (CENELEC), Brussels, Belgium, Feb. 1997."},{"key":"6_CR7","unstructured":"ETSI, \u201cDigital Video Broadcasting (DVB); Head-End Implementation of DVB Simulcrypt,\u201d ETSI Standard TS 103 197 V1.5.1 (2008 - 10), European Telecommunications Standards Institute (ETSI), Sophia Antipolis, France, 2008: available online at \nhttp:\/\/www.etsi.org\/deliver\/etsi_ts\/103100_103199\/103197\/01.05.01_60\/ts_103197v010501p.pdf\n\n accessed June 2016"},{"key":"6_CR8","unstructured":"D. Multimedia TV GmbH, Dreambox DM7000S user manual, 2004: available online at \nhttp:\/\/www.dream-multimedia-tv.de\/en\/downloads\n\n accessed June 2016"},{"key":"6_CR9","unstructured":"L. Francis, W. Sirett, K. Markantonakis, and K. Mayes, \u201cCountermeasures for attacks on satellite TV cards using open receivers,\u201d in Australasian Information Security Workshop 2005 (AISW2005) (R. Buyya, P. Coddington, P. Montague, R. Naini, N. Shepperd, and A. Wendelborn, eds.), vol. 44, pp. 53\u2013158, Australian Computer Society Inc., 2005."},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"E. Gallery and A. Tomlinson, \u201cConditional Access in Mobile Systems: Securing the Application,\u201d in The First International Conference on Distributed Frameworks for Multimedia Applications DFMA 05, (Los Alamitos, CA, USA), pp. 190\u2013197, IEEE Computer Society, February 2005.","DOI":"10.1109\/DFMA.2005.17"},{"key":"6_CR11","unstructured":"MediaCrypt AG, \u201cIDEA NXT Technical Description,\u201d available online at \nhttps:\/\/web.archive.org\/web\/20070928014200\n\n, \nhttp:\/\/www.mediacrypt.com\/_pdf\/NXT_Technical_Description_0406.pdf"}],"container-title":["Smart Cards, Tokens, Security and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-50500-8_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,5,18]],"date-time":"2017-05-18T07:17:43Z","timestamp":1495091863000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-50500-8_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319504988","9783319505008"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-50500-8_6","relation":{},"subject":[],"published":{"date-parts":[[2017]]}}}