메뉴 건너뛰기




Volumn 20, Issue 1, 2009, Pages 139-150

Robust key exchange protocol between set-top box and smart card in DTV broadcasting

Author keywords

Cryptanalysis; Cryptography; DTV broadcasting; Key exchange; Set top box; Smart card

Indexed keywords


EID: 62449114806     PISSN: 08684952     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (16)

References (18)
  • 1
    • 33947392992 scopus 로고    scopus 로고
    • A secure YS-like user authentication scheme
    • Chen, T.H, Horng, G. and K.C. Wu (2007). A secure YS-like user authentication scheme. Informatica, 18(1), 27-36.
    • (2007) Informatica , vol.18 , Issue.1 , pp. 27-36
    • Chen, T.H.1    Horng, G.2    Wu, K.C.3
  • 2
    • 42149157246 scopus 로고    scopus 로고
    • Public key authentication schemes for local area networks
    • Chen, T.H, Horng, G. and C.S. Yang (2008). Public key authentication schemes for local area networks, Informatica, 19(1), 3-16.
    • (2008) Informatica , vol.19 , Issue.1 , pp. 3-16
    • Chen, T.H.1    Horng, G.2    Yang, C.S.3
  • 3
    • 0017018484 scopus 로고
    • New directions in cryptography
    • Diffie, W., and M. Hellman (1976). New directions in cryptography. IEEE Trans. Inf. Theory, IT-22(6), 644-654.
    • (1976) IEEE Trans. Inf. Theory , vol.IT-22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.2
  • 4
    • 6944222739 scopus 로고    scopus 로고
    • Secure communication between set-top box and smart card in DTV broadcasting
    • Jiang, T., Hou, Y. and S. Zheng (2004). Secure communication between set-top box and smart card in DTV broadcasting. IEEE Trans. Consum. Electr., 50(3), 882-886.
    • (2004) IEEE Trans. Consum. Electr , vol.50 , Issue.3 , pp. 882-886
    • Jiang, T.1    Hou, Y.2    Zheng, S.3
  • 5
    • 1942423668 scopus 로고    scopus 로고
    • Key distribution based on hierarchical access control for conditional access system in DTV broadcast
    • Jiang, T., Zheng, S. and B. Liu (2004). Key distribution based on hierarchical access control for conditional access system in DTV broadcast. IEEE Trans. Consum. Electr., 50(1), 225-230.
    • (2004) IEEE Trans. Consum. Electr , vol.50 , Issue.1 , pp. 225-230
    • Jiang, T.1    Zheng, S.2    Liu, B.3
  • 6
    • 0035245703 scopus 로고    scopus 로고
    • Conditonal access system interoperability through software downloading
    • Kamperman, F., and B.V. Rijnsoever (2001). Conditonal access system interoperability through software downloading. IEEE Trans. on Consumer Electronics, 47(1), 47-53.
    • (2001) IEEE Trans. on Consumer Electronics , vol.47 , Issue.1 , pp. 47-53
    • Kamperman, F.1    Rijnsoever, B.V.2
  • 9
    • 0037282439 scopus 로고    scopus 로고
    • A password authentication scheme with secure password updating
    • Lin, C.L., and T. Hwang (2003). A password authentication scheme with secure password updating. Computers & Security, 22(1), 68-72.
    • (2003) Computers & Security , vol.22 , Issue.1 , pp. 68-72
    • Lin, C.L.1    Hwang, T.2
  • 10
    • 84936892450 scopus 로고
    • Cryptology for digital TV broadcasting
    • Macq, B., and J. Quisquater (1995). Cryptology for digital TV broadcasting, In Proceedings of the IEEE, 83(6). pp. 944-957.
    • (1995) Proceedings of the IEEE , vol.83 , Issue.6 , pp. 944-957
    • Macq, B.1    Quisquater, J.2
  • 12
    • 33947396398 scopus 로고    scopus 로고
    • Key agreement protocol (KAP) using conjugacy and discrete logarithm problems in group representation level
    • Sakalauskas, E., Tvarijonas, P. and A. Raulynaitis (2007). Key agreement protocol (KAP) using conjugacy and discrete logarithm problems in group representation level. Informatica, 18(1), 115-124.
    • (2007) Informatica , vol.18 , Issue.1 , pp. 115-124
    • Sakalauskas, E.1    Tvarijonas, P.2    Raulynaitis, A.3
  • 13
    • 0000537828 scopus 로고
    • Efficient identification and signatures for smart cards
    • Crypto'89
    • Schnorr C.P. (1990). Efficient identification and signatures for smart cards, In Crypto'89, LNCS 435. pp. 235-251.
    • (1990) LNCS , vol.435 , pp. 235-251
    • Schnorr, C.P.1
  • 14
    • 0002839106 scopus 로고
    • Refinement and extension of encrypted key exchange
    • Steiner, M., Tsudik, G. and M. Waidner (1995). Refinement and extension of encrypted key exchange. ACM Operating Systems Review, 29(3), 22-30.
    • (1995) ACM Operating Systems Review , vol.29 , Issue.3 , pp. 22-30
    • Steiner, M.1    Tsudik, G.2    Waidner, M.3
  • 15
    • 33947405259 scopus 로고    scopus 로고
    • An efficient two-party identity-based key exchange protocol
    • Tseng, Y.M. (2007). An efficient two-party identity-based key exchange protocol, Informatica, 18(1), 125-136.
    • (2007) Informatica , vol.18 , Issue.1 , pp. 125-136
    • Tseng, Y.M.1
  • 16
    • 47949104161 scopus 로고    scopus 로고
    • A pairing-based user authentication scheme for wireless clients with smart cards
    • Tseng, Y.M., Wu, T.Y. and J.D. Wu (2008). A pairing-based user authentication scheme for wireless clients with smart cards. Informatica, 19(2), 285-302.
    • (2008) Informatica , vol.19 , Issue.2 , pp. 285-302
    • Tseng, Y.M.1    Wu, T.Y.2    Wu, J.D.3
  • 17
    • 0032626528 scopus 로고    scopus 로고
    • On key distribution management for conditional access system on pay-TV system
    • Tu, F.K., Laih, C.S. and H.H. Tung (1999). On key distribution management for conditional access system on pay-TV system. IEEE Trans. Consum. Electr., 45, 151-158.
    • (1999) IEEE Trans. Consum. Electr , vol.45 , pp. 151-158
    • Tu, F.K.1    Laih, C.S.2    Tung, H.H.3
  • 18
    • 0142007845 scopus 로고    scopus 로고
    • Yang, C.C., T.Y. Chang, T.Y. and J.W. Li (2003). Security enhancement for protecting password transmission. IEICE Transactions on Communications. E86-B(7). pp. 2178-2181.
    • Yang, C.C., T.Y. Chang, T.Y. and J.W. Li (2003). Security enhancement for protecting password transmission. IEICE Transactions on Communications. E86-B(7). pp. 2178-2181.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.