-
1
-
-
84874326449
-
-
Conditional-access broadcasting system, ITU-R Rec. 810
-
Conditional-access broadcasting system, ITU-R Rec. 810, 1992.
-
(1992)
-
-
-
2
-
-
0034140141
-
Privacy and non-repudiation on pay-TV systems
-
Lee N, Chang C, Lin C, Hwang T. Privacy and non-repudiation on pay-TV systems. IEEE Transactions on Consumer Electronics 2000; 46(1):20-27.
-
(2000)
IEEE Transactions on Consumer Electronics
, vol.46
, Issue.1
, pp. 20-27
-
-
Lee, N.1
Chang, C.2
Lin, C.3
Hwang, T.4
-
3
-
-
0042196056
-
Pay-TV system with strong privacy and nonrepudiation protection
-
Song R, Korba L. Pay-TV system with strong privacy and nonrepudiation protection. IEEE Transactions on Consumer Electronics 2003; 49(2): 408-413.
-
(2003)
IEEE Transactions on Consumer Electronics
, vol.49
, Issue.2
, pp. 408-413
-
-
Song, R.1
Korba, L.2
-
4
-
-
84874324192
-
-
Head-end implementation of DVB simulcrypt, ETSI Standard, ETSI TS 103 197V1.4.1
-
Head-end implementation of DVB simulcrypt, ETSI Standard, ETSI TS 103 197V1.4.1, 2004.
-
(2004)
-
-
-
5
-
-
68549115315
-
An efficient authentication scheme for access control in mobile pay-TV systems
-
Sun HM, Leu MC. An efficient authentication scheme for access control in mobile pay-TV systems. IEEE Transactions on Multimedia 2009; 11(5):947-959.
-
(2009)
IEEE Transactions on Multimedia
, vol.11
, Issue.5
, pp. 947-959
-
-
Sun, H.M.1
Leu, M.C.2
-
6
-
-
0033157562
-
An alternative paradigm for scalable on-demand applications: evaluating and deploying the interactive multimedia jukebox
-
Almeroth KC, Ammar MH. An alternative paradigm for scalable on-demand applications: evaluating and deploying the interactive multimedia jukebox. IEEE Transactions on Knowledge and Data Engineering 1999; 11(4):658-672.
-
(1999)
IEEE Transactions on Knowledge and Data Engineering
, vol.11
, Issue.4
, pp. 658-672
-
-
Almeroth, K.C.1
Ammar, M.H.2
-
7
-
-
0036688566
-
A recursive frequency-splitting scheme for broadcasting hot videos in VOD service
-
Tseng Y, Yang M, Chang C. A recursive frequency-splitting scheme for broadcasting hot videos in VOD service. IEEE Transactions on Communications 2002; 50(8):1348-1355.
-
(2002)
IEEE Transactions on Communications
, vol.50
, Issue.8
, pp. 1348-1355
-
-
Tseng, Y.1
Yang, M.2
Chang, C.3
-
8
-
-
84936892450
-
Cryptology for digital TV broadcasting
-
Macq BM, Quisquater J. Cryptology for digital TV broadcasting. Proceedings of the IEEE 1995; 83(6):944-957.
-
(1995)
Proceedings of the IEEE
, vol.83
, Issue.6
, pp. 944-957
-
-
Macq, B.M.1
Quisquater, J.2
-
10
-
-
33646444631
-
-
Conditional access in mobile systems: securing the application. In Proceedings of First International Conference on Distributed Frameworks for Multimedia Applications (DFMA05)
-
Gallery E, Tomlinson A. Conditional access in mobile systems: securing the application. In Proceedings of First International Conference on Distributed Frameworks for Multimedia Applications (DFMA05), 2005; 190-197.
-
(2005)
, pp. 190-197
-
-
Gallery, E.1
Tomlinson, A.2
-
11
-
-
35248844436
-
-
An identity-based signature from gap Diffie-Hellman groups. In Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography (PKC′03)
-
Cha JC, Cheon JH. An identity-based signature from gap Diffie-Hellman groups. In Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography (PKC′03), 2003; 18-30.
-
(2003)
, pp. 18-30
-
-
Cha, J.C.1
Cheon, J.H.2
-
13
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest RL, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 1978; 21(2):120-126.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
14
-
-
84968503742
-
Elliptic curve cryptosystems
-
Koblitz N. Elliptic curve cryptosystems. Mathematics of Computation 1987; 48(177):203-209.
-
(1987)
Mathematics of Computation
, vol.48
, Issue.177
, pp. 203-209
-
-
Koblitz, N.1
-
19
-
-
67650224819
-
Practical short signature batch verification
-
Ferrara AL, Green M, Huhenberger S, Pedersen M. Practical short signature batch verification. In Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology, (CT-RSA'09), 2009; 309-324.
-
(2009)
Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology, (CT-RSA'09)
, pp. 309-324
-
-
Ferrara, A.L.1
Green, M.2
Huhenberger, S.3
Pedersen, M.4
-
20
-
-
0029717329
-
-
Proxy signatures for delegating signing operation. In Proceedings of the 3rd ACM Conference on Computer and Communications Security.;
-
Mambo M, Usuda K, Okamoto E. Proxy signatures for delegating signing operation. In Proceedings of the 3rd ACM Conference on Computer and Communications Security. 1996; 48-57.
-
(1996)
, pp. 48-57
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
21
-
-
58149108946
-
An efficient mobile authentication scheme for wireless networks
-
Tang C, Wu DO. An efficient mobile authentication scheme for wireless networks. IEEE Transactions on Wireless Communications 2008; 7(1):1408-1416.
-
(2008)
IEEE Transactions on Wireless Communications
, vol.7
, Issue.1
, pp. 1408-1416
-
-
Tang, C.1
Wu, D.O.2
-
22
-
-
78649983188
-
A fast handover authentication mechanism based on ticket for IEEE 802.16m
-
Fu A, Zhang Y, Zhu Z, Liu X. A fast handover authentication mechanism based on ticket for IEEE 802.16m. IEEE Communications Letters 2010; 14(12):1134-1136.
-
(2010)
IEEE Communications Letters
, vol.14
, Issue.12
, pp. 1134-1136
-
-
Fu, A.1
Zhang, Y.2
Zhu, Z.3
Liu, X.4
-
23
-
-
67349168446
-
BAT: a robust signature scheme for vehicular networks using binary authentication tree
-
Jiang Y, Shi M, Shen X, Lin C. BAT: a robust signature scheme for vehicular networks using binary authentication tree. IEEE Transactions on Wireless Communications 2009; 8(4): 1974-1983.
-
(2009)
IEEE Transactions on Wireless Communications
, vol.8
, Issue.4
, pp. 1974-1983
-
-
Jiang, Y.1
Shi, M.2
Shen, X.3
Lin, C.4
-
24
-
-
84976770858
-
Responses to NIST's proposal
-
Vanstone S. Responses to NIST's proposal. Communications of the ACM 1992; 35(7):41-54.
-
(1992)
Communications of the ACM
, vol.35
, Issue.7
, pp. 41-54
-
-
Vanstone, S.1
-
25
-
-
84874329804
-
-
Key agreement protocols and their security analysis. In Proceedings of the 6th IMA International Conference on Cryptography and Coding
-
Blake-Wilson S, Johnson D, Menezes A. Key agreement protocols and their security analysis. In Proceedings of the 6th IMA International Conference on Cryptography and Coding, 1997.
-
(1997)
-
-
Blake-Wilson, S.1
Johnson, D.2
Menezes, A.3
-
27
-
-
1842715081
-
The advantages of elliptic curve cryptography for wireless security
-
Lauter K. The advantages of elliptic curve cryptography for wireless security. IEEE Wireless Communications 2004; 11(1):62-67.
-
(2004)
IEEE Wireless Communications
, vol.11
, Issue.1
, pp. 62-67
-
-
Lauter, K.1
|