{ "name": "Multicast security", "order": 35, "challenges": [ { "id": "59a5801209a6acac5983b700", "title": "Introduction to Multicast security and copyright protection", "description": [ "" ], "challengeSeed": [ "" ], "tests": [ "" ] }, { "id": "59a5801209a6acac5983b312", "title": "Broadcast encryption", "description": [ "" ], "challengeSeed": [ "" ], "tests": [ "" ] }, { "id": "59a5801209a6acac5983b313", "title": "Improvement using Ramp Schemes", "description": [ "" ], "challengeSeed": [ "" ], "tests": [ "" ] }, { "id": "59a5801209a6acac5983b314", "title": "Multicast re-keying", "description": [ "" ], "challengeSeed": [ "" ], "tests": [ "" ] }, { "id": "59a5801209a6acac5983b315", "title": "Blacklisting scheme", "description": [ "" ], "challengeSeed": [ "" ], "tests": [ "" ] }, { "id": "59a5801209a6acac5983b316", "title": "The Naor-Pinkas Re-keying scheme", "description": [ "" ], "challengeSeed": [ "" ], "tests": [ "" ] }, { "id": "59a5801209a6acac5983b317", "title": "Logical key hierarchy", "description": [ "" ], "challengeSeed": [ "" ], "tests": [ "" ] } ] }