1 S. Bhattacherjee, "Tree based symmetric key broadcast encryption" 2013
2 B. Chor, "Tracing traitors" 839 : 257-270, 1994
3 D. Halevy, "The LSD broadcast encryption scheme" 2442 : 47-60, 2002
4 D. Naor, "Revocation and tracing schemes for stateless receivers" 2139 : 41-62, 2001
5 Y. Dodis, "Public key broadcast encryption for stateless receivers" 61-80, 2002
6 M. T. Goodrich, "Efficient tree-based revocation in groups of low-state devices" 3152 : 511-527, 2004
7 D. Boneh, "Collusion resistant broadcast encryption with short ciphertexts and private keys" 3621 : 258-275, 2005
8 A. Fiat, "Broadcast encryption" 773 : 480-491, 1993
9 ChongHee Kim, "An efficient public key trace and revoke scheme secure against adaptive chosen ciphertext attack" 2894 : 359-373, 2003
10 D. Boneh, "A fully collusion resistant broadcast, trace, and revoke system" 211-220, 2006
1 S. Bhattacherjee, "Tree based symmetric key broadcast encryption" 2013
2 B. Chor, "Tracing traitors" 839 : 257-270, 1994
3 D. Halevy, "The LSD broadcast encryption scheme" 2442 : 47-60, 2002
4 D. Naor, "Revocation and tracing schemes for stateless receivers" 2139 : 41-62, 2001
5 Y. Dodis, "Public key broadcast encryption for stateless receivers" 61-80, 2002
6 M. T. Goodrich, "Efficient tree-based revocation in groups of low-state devices" 3152 : 511-527, 2004
7 D. Boneh, "Collusion resistant broadcast encryption with short ciphertexts and private keys" 3621 : 258-275, 2005
8 A. Fiat, "Broadcast encryption" 773 : 480-491, 1993
9 ChongHee Kim, "An efficient public key trace and revoke scheme secure against adaptive chosen ciphertext attack" 2894 : 359-373, 2003
10 D. Boneh, "A fully collusion resistant broadcast, trace, and revoke system" 211-220, 2006