1 "Unpredictable Bit Generation Without Broadcast Vol-ume 765 of Lecture Notes in Computer Science" Springer -Verlag 424 23-434 27, 1993
2 "Trade-offs Between Communication and Storage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution In Advances in Cryptology-Crypro '96 Lecture Notes in Computer Science 1109" 1109, : 387-400,
3 "Towards Marking Broadcast Encryption Practical^No^August" Vol.8, (Vol.8,): 443-454, 2000
4 "Space Requirements for Broadcast Encryption" 287-950 298, 1994
5 "Public Key Broadcast Encryption for Stateless Receivers" 2002
6 "Practical Pay TV Schemes" 2003
7 "Long-Lived Broadcast Encryption of Springer Lecture Notes in Computer Science" I 2000volume 1880 : 333-352, 2000
8 "Lecture Notes in Computer ScienceThe LSD Broadcast Encryption Scheme" 47-60, 2002
9 "Improving the Trade-off Between Storage and Communication in Broadcast Encryption Schemes" 2001
10 "Hyun Jung Kim and Jong In Lim Efficient Public-Key Traitor Tracing in Provably Secure Broadcast Encryption with Unlimited Revocation Capability" 2003
1 "Unpredictable Bit Generation Without Broadcast Vol-ume 765 of Lecture Notes in Computer Science" Springer -Verlag 424 23-434 27, 1993
2 "Trade-offs Between Communication and Storage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution In Advances in Cryptology-Crypro '96 Lecture Notes in Computer Science 1109" 1109, : 387-400,
3 "Towards Marking Broadcast Encryption Practical^No^August" Vol.8, (Vol.8,): 443-454, 2000
4 "Space Requirements for Broadcast Encryption" 287-950 298, 1994
5 "Public Key Broadcast Encryption for Stateless Receivers" 2002
6 "Practical Pay TV Schemes" 2003
7 "Long-Lived Broadcast Encryption of Springer Lecture Notes in Computer Science" I 2000volume 1880 : 333-352, 2000
8 "Lecture Notes in Computer ScienceThe LSD Broadcast Encryption Scheme" 47-60, 2002
9 "Improving the Trade-off Between Storage and Communication in Broadcast Encryption Schemes" 2001
10 "Hyun Jung Kim and Jong In Lim Efficient Public-Key Traitor Tracing in Provably Secure Broadcast Encryption with Unlimited Revocation Capability" 2003
11 "Generalized Beimel-Chor schemes for Broadcast Encryption and Interactive Key Distribution" Vol.200, : 313-334, 1998
12 "AN Efficient Public Key Traitor Tracing Scheme" 338- 353, 1999