-
1
-
-
0035245703
-
Conditonal access system interoperability through software downloading
-
F. Kamperman and B.V. Rijnsoever, "Conditonal access system interoperability through software downloading," IEEE Trans. on Consumer Electronics, vol. 47, no. 1, pp. 47-53, 2001.
-
(2001)
IEEE Trans. on Consumer Electronics
, vol.47
, Issue.1
, pp. 47-53
-
-
Kamperman, F.1
Rijnsoever, B.V.2
-
2
-
-
0142007845
-
Security enhancement for protecting password transmission
-
C.C. Yang, T.Y. Chang, and J.W. Li, "Security enhancement for protecting password transmission," IEICE Transactions on Communications, vol. E86-B, no. 7, pp. 2178-2181, 2003.
-
(2003)
IEICE Transactions on Communications
, vol.E86-B
, Issue.7
, pp. 2178-2181
-
-
Yang, C.C.1
Chang, T.Y.2
Li, J.W.3
-
3
-
-
0037282439
-
A password authentication scheme with secure password updating
-
C.L. Lin and T. Hwang, "A password authentication scheme with secure password updating," Computers & Security, vol. 22, no. 1, pp. 68-72, 2003.
-
(2003)
Computers & Security
, vol.22
, Issue.1
, pp. 68-72
-
-
Lin, C.L.1
Hwang, T.2
-
4
-
-
0000537828
-
Efficient identification and signatures for smart cards
-
Crypto'89
-
C.P. Schnorr, "Efficient identification and signatures for smart cards," In Crypto'89, LNCS 435, pp. 235-251, 1990.
-
(1990)
LNCS
, vol.435
, pp. 235-251
-
-
Schnorr, C.P.1
-
5
-
-
0037810691
-
A practical revocation scheme for broadcast encryption using smart cards
-
N. Kogan, Y. Shavitt, and A. Wool, "A practical revocation scheme for broadcast encryption using smart cards," Proc. of IEEE symposium on security and privacy, pp. 225-235, 2003.
-
(2003)
Proc. of IEEE Symposium on Security and Privacy
, pp. 225-235
-
-
Kogan, N.1
Shavitt, Y.2
Wool, A.3
-
7
-
-
84936892450
-
Cryptology for digital TV broadcasting
-
B. Macq and J. Quisquater, "Cryptology for digital TV broadcasting," Proceedings of the IEEE, vol. 83, no. 6, pp. 944-957, 1995.
-
(1995)
Proceedings of the IEEE
, vol.83
, Issue.6
, pp. 944-957
-
-
Macq, B.1
Quisquater, J.2
-
8
-
-
0032626528
-
On key distribution management for conditional access system on pay-TV system
-
F.K. Tu, C.S. Laih, andH.H. Tung, "On key distribution management for conditional access system on pay-TV system,"IEEE Trans. Consum. Electr, vol. 45, pp. 151-158, 1999.
-
(1999)
IEEE Trans. Consum. Electr
, vol.45
, pp. 151-158
-
-
Tu, F.K.1
Laih, C.S.2
Tung, H.H.3
-
9
-
-
1942423668
-
Key distribution based on hierarchical access control for conditional access system in DTV broadcast
-
T. Jiang, S. Zheng, andB. Liu, "Key distribution based on hierarchical access control for conditional access system in DTV broadcast," IEEE Trans. Consum. Electr., vol.50 no. 1, pp. 225-230, 2004.
-
(2004)
IEEE Trans. Consum. Electr.
, vol.50
, Issue.1
, pp. 225-230
-
-
Jiang, T.1
Zheng, S.2
Liu, B.3
-
10
-
-
33947392992
-
A secure YS-like user authentication scheme
-
T.H Chen, G. Horng, and K.C. Wu, "A secure YS-like user authentication scheme," Informatica, vol. 18, no. 1, pp. 27-36, 2007.
-
(2007)
Informatica
, vol.18
, Issue.1
, pp. 27-36
-
-
Chen, T.H.1
Horng, G.2
Wu, K.C.3
-
11
-
-
33947405259
-
An efficient two-party identity-based key exchange protocol
-
Y.M. Tseng, "An efficient two-party identity-based key exchange protocol," Informatica, vol. 18, no. 1, pp. 125-136, 2007.
-
(2007)
Informatica
, vol.18
, Issue.1
, pp. 125-136
-
-
Tseng, Y.M.1
-
12
-
-
33947396398
-
Key agreement protocol (KAP) using conjugacy and discrete logarithm problems in group representation level
-
E. Sakalauskas, P. Tvarijonas, and A. Raulynaitis, "Key agreement protocol (KAP) using conjugacy and discrete logarithm problems in group representation level," Informatica, vol. 18, no. 1, pp. 115-124, 2007.
-
(2007)
Informatica
, vol.18
, Issue.1
, pp. 115-124
-
-
Sakalauskas, E.1
Tvarijonas, P.2
Raulynaitis, A.3
-
13
-
-
42149157246
-
Public key authentication schemes for local area networks
-
T.H Chen, G. Horng, and C.S. Yang, "Public key authentication schemes for local area networks," Informatica, vol. 19, no. 1, pp. 3-16, 2008.
-
(2008)
Informatica
, vol.19
, Issue.1
, pp. 3-16
-
-
Chen, T.H.1
Horng, G.2
Yang, C.S.3
-
14
-
-
47949104161
-
A pairing-based user authentication scheme for wireless clients with smart cards
-
Y.M. Tseng, T.Y. Wu, and J.D. Wu, "A pairing-based user authentication scheme for wireless clients with smart cards,"Informatica, vol. 19, no. 2, pp. 285-302, 2008.
-
(2008)
Informatica
, vol.19
, Issue.2
, pp. 285-302
-
-
Tseng, Y.M.1
Wu, T.Y.2
Wu, J.D.3
-
15
-
-
84968503742
-
Elliptic curve cryptosystems
-
N. Koblitz, "Elliptic curve cryptosystems," Mathematics of Computation, vol. 48, pp. 203-209, 1987.
-
(1987)
Mathematics of Computation
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
16
-
-
85015402934
-
Uses of elliptic curves in cryptography
-
Proc of CRYPTO'85, Springer, Berlin
-
V. Miller, "Uses of elliptic curves in cryptography," In: Proc of CRYPTO'85, Lecture notes in computer science, vol. 218, Springer, Berlin, pp. 417-426, 1986.
-
(1986)
Lecture Notes in Computer Science
, vol.218
, pp. 417-426
-
-
Miller, V.1
-
17
-
-
11244267013
-
Guide to elliptic curve cryptography
-
Springer, Berlin
-
D. Hankerson, A. Menezes, and S. Vanstone, "Guide to elliptic curve cryptography," Lecture notes in computer science, Springer, Berlin, 2004.
-
(2004)
Lecture Notes in Computer Science
-
-
Hankerson, D.1
Menezes, A.2
Vanstone, S.3
-
18
-
-
0017018484
-
New directions in cryptography
-
W. Diffie and M. Hellman, "New directions in cryptography,"IEEE Trans. Inf. Theory, vol. IT-22, no. 6, pp. 644-654, 1976.
-
(1976)
IEEE Trans. Inf. Theory
, vol.IT-22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
20
-
-
6944222739
-
Secure communication between set-top box and smart card in DTV broadcasting
-
T. Jiang, Y. Hou, and S. Zheng, "Secure communication between set-top box and smart card in DTV broadcasting,"IEEE Trans. Consum. Electr, vol. 50, no. 3, pp. 882-886, 2004.
-
(2004)
IEEE Trans. Consum. Electr
, vol.50
, Issue.3
, pp. 882-886
-
-
Jiang, T.1
Hou, Y.2
Zheng, S.3
-
21
-
-
62449114806
-
Robust key exchange protocol between set-top box and smart card in DTV broadcasting
-
E.J. Yoon and K.Y. Yoo, "Robust key exchange protocol between set-top box and smart card in DTV broadcasting,"Informatica, vol. 20, no. 1, pp. 139-150, 2009.
-
(2009)
Informatica
, vol.20
, Issue.1
, pp. 139-150
-
-
Yoon, E.J.1
Yoo, K.Y.2
-
22
-
-
0002839106
-
Refinement and extension of encrypted key exchange
-
M. Steiner, G. Tsudik, and M. Waidner, "Refinement and extension of encrypted key exchange," ACM Operating Systems Review, vol. 29, no. 3, pp. 22-30, 1995.
-
(1995)
ACM Operating Systems Review
, vol.29
, Issue.3
, pp. 22-30
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
|