-
1
-
-
78751647681
-
The design of RFID access control protocol using the strategy of indefinite-index and challenge-response
-
Chen, Y. Y., Tsai, M. L., & Jan, J. K. (2011). The design of RFID access control protocol using the strategy of indefinite-index and challenge-response. Computer Communications, 34(3), 250–256.
-
(2011)
Computer Communications
, vol.34
, Issue.3
, pp. 250-256
-
-
Chen, Y.Y.1
Tsai, M.L.2
Jan, J.K.3
-
3
-
-
36248982045
-
SASI: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity
-
Chien, H. Y. (2007). SASI: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Transactions on Dependable and Secure Computing, 4(3), 337–340.
-
(2007)
IEEE Transactions on Dependable and Secure Computing
, vol.4
, Issue.3
, pp. 337-340
-
-
Chien, H.Y.1
-
4
-
-
33751546328
-
Mutual-authentication protocol for RFID conforming to EPC class 1 generation 2 standards
-
Chien, H. Y., & Chen, C. H. (2007). Mutual-authentication protocol for RFID conforming to EPC class 1 generation 2 standards. Computer Standards & Interfaces, 29(2), 254–259.
-
(2007)
Computer Standards & Interfaces
, vol.29
, Issue.2
, pp. 254-259
-
-
Chien, H.Y.1
Chen, C.H.2
-
7
-
-
0017018484
-
New directions in cryptography
-
Diffie, W., & Hellman, M. E. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644–654.
-
(1976)
IEEE Transactions on Information Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
9
-
-
77951456595
-
A QoE management system for ubiquitous IPTV devices
-
Garcia, M., Canovas, A., Edo, M., & Lloret, J. (2009). A QoE management system for ubiquitous IPTV devices. In Proceedings of IEEE international conference on mobile ubiquitous computing (pp. 147–152).
-
(2009)
Proceedings of IEEE international conference on mobile ubiquitous computing
, pp. 147-152
-
-
Garcia, M.1
Canovas, A.2
Edo, M.3
Lloret, J.4
-
11
-
-
23744437250
-
A secure protocol for bluetooth piconets using elliptic curve cryptography
-
Hwang, M. S., Lee, C. C., Lee, J. Z., & Yang, C. C. (2005). A secure protocol for bluetooth piconets using elliptic curve cryptography. Telecommunication Systems, 29(3), 165–180.
-
(2005)
Telecommunication Systems
, vol.29
, Issue.3
, pp. 165-180
-
-
Hwang, M.S.1
Lee, C.C.2
Lee, J.Z.3
Yang, C.C.4
-
13
-
-
1942423668
-
Key distribution based on hierarchical access control for conditional access system in DTV broadcast
-
Jiang, T., Zheng, S., & Liu, B. (2004). Key distribution based on hierarchical access control for conditional access system in DTV broadcast. IEEE Transactions on Consumer Electronics, 50(1), 225–230.
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.1
, pp. 225-230
-
-
Jiang, T.1
Zheng, S.2
Liu, B.3
-
14
-
-
6944222739
-
Secure communication between set-top box and smart card in DTV broadcasting
-
Jiang, T., Hou, Y., & Zheng, S. (2004). Secure communication between set-top box and smart card in DTV broadcasting. IEEE Transactions on Consumer Electronics, 50(3), 882–886.
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.3
, pp. 882-886
-
-
Jiang, T.1
Hou, Y.2
Zheng, S.3
-
15
-
-
77954440005
-
A fingerprint-based user authentication scheme using smart cards in IPTV environments
-
Jun, E., Rhee, H. S., Jung, S. W., & Lee, D. H. (2010). A fingerprint-based user authentication scheme using smart cards in IPTV environments. In Proceedings of IEEE international conference on information science (pp. 1–8).
-
(2010)
Proceedings of IEEE international conference on information science
, pp. 1-8
-
-
Jun, E.1
Rhee, H.S.2
Jung, S.W.3
Lee, D.H.4
-
17
-
-
58149378951
-
Implementation of the storage manager for an IPTV set-top box
-
Kim, T., & Bahn, H. (2008). Implementation of the storage manager for an IPTV set-top box. IEEE Transactions on Consumer Electronics, 54(4), 1770–1775.
-
(2008)
IEEE Transactions on Consumer Electronics
, vol.54
, Issue.4
, pp. 1770-1775
-
-
Kim, T.1
Bahn, H.2
-
18
-
-
24944582157
-
Efficient authentication for low-cost RFID systems
-
Lee, S. M., Hwang, Y. J., Lee, D. H., & Lim, J. I. (2005). Efficient authentication for low-cost RFID systems. In Proceedings of international conference on computational science and its applications (pp. 619–627).
-
(2005)
Proceedings of international conference on computational science and its applications
, pp. 619-627
-
-
Lee, S.M.1
Hwang, Y.J.2
Lee, D.H.3
Lim, J.I.4
-
20
-
-
80054905646
-
A new key exchange protocol with anonymity between STB and smart card in IPTV broadcasting
-
Lee, C. C., Li, C. T., Chen, T. Y., Wu, P. H., & Chen, C. T. (2011). A new key exchange protocol with anonymity between STB and smart card in IPTV broadcasting. In Proceedings of IEEE international conference on wireless communications, networking and mobile computing (pp. 23–25).
-
(2011)
Proceedings of IEEE international conference on wireless communications, networking and mobile computing
, pp. 23-25
-
-
Lee, C.C.1
Li, C.T.2
Chen, T.Y.3
Wu, P.H.4
Chen, C.T.5
-
21
-
-
79951814345
-
An efficient authentication protocol for mobile communications
-
Lee, C. C., Liao, I. E., & Hwang, M. S. (2011). An efficient authentication protocol for mobile communications. Telecommunication Systems, 46(1), 31–41.
-
(2011)
Telecommunication Systems
, vol.46
, Issue.1
, pp. 31-41
-
-
Lee, C.C.1
Liao, I.E.2
Hwang, M.S.3
-
22
-
-
67650330575
-
Securing RFID systems by detecting tag cloning
-
Lehtonen, M., Ostojic, D., Ilic, A., & Michahelles, F. (2009). Securing RFID systems by detecting tag cloning. In Proceedings of the 7th international conference on pervasive computing (pp. 291–308).
-
(2009)
Proceedings of the 7th international conference on pervasive computing
, pp. 291-308
-
-
Lehtonen, M.1
Ostojic, D.2
Ilic, A.3
Michahelles, F.4
-
23
-
-
84936892450
-
Cryptology for digital TV broadcasting
-
Macq, B., & Quisquater, J. (1995). Cryptology for digital TV broadcasting. Proceedings of the IEEE, 83(6), 944–957.
-
(1995)
Proceedings of the IEEE
, vol.83
, Issue.6
, pp. 944-957
-
-
Macq, B.1
Quisquater, J.2
-
24
-
-
57849096174
-
Achieving interoperability in conditional access systems through the dynamic download and execution of cryptographic software for the IPTV system
-
Moon, J., Kim, J., Park, J., & Paik, E. (2008). Achieving interoperability in conditional access systems through the dynamic download and execution of cryptographic software for the IPTV system. In Proceedings of IEEE international conference on convergence and hybrid information technology (pp. 380–385).
-
(2008)
Proceedings of IEEE international conference on convergence and hybrid information technology
, pp. 380-385
-
-
Moon, J.1
Kim, J.2
Park, J.3
Paik, E.4
-
25
-
-
72349086412
-
A dynamic conditional access system for IPTV multimedia systems
-
Moon, J., Kim, J., Park, J., Paik, E., & Park, K. (2009). A dynamic conditional access system for IPTV multimedia systems. In Proceedings of IEEE international conference on systems and networks communications (pp. 224–229).
-
(2009)
Proceedings of IEEE international conference on systems and networks communications
, pp. 224-229
-
-
Moon, J.1
Kim, J.2
Park, J.3
Paik, E.4
Park, K.5
-
28
-
-
32444435813
-
Radio frequency identification (RFID)
-
Roberts, C. M. (2006). Radio frequency identification (RFID). Computers & Security, 25(1), 18–26.
-
(2006)
Computers & Security
, vol.25
, Issue.1
, pp. 18-26
-
-
Roberts, C.M.1
-
29
-
-
42549157259
-
A framework for assessing RFID system security and privacy risks
-
Rotter, P. (2008). A framework for assessing RFID system security and privacy risks. IEEE Pervasive Computing, 7(2), 70–77.
-
(2008)
IEEE Pervasive Computing
, vol.7
, Issue.2
, pp. 70-77
-
-
Rotter, P.1
-
30
-
-
39349105580
-
Performance analysis of IPTV traffic in home networks
-
Shihab, E., Wan, F., Cai, L., Gulliver, A., & Tin, N. (2007). Performance analysis of IPTV traffic in home networks. In Proceedings of IEEE global telecommunications conference (pp. 5341–5345).
-
(2007)
Proceedings of IEEE global telecommunications conference
, pp. 5341-5345
-
-
Shihab, E.1
Wan, F.2
Cai, L.3
Gulliver, A.4
Tin, N.5
-
31
-
-
0037942544
-
Cryptanalysis of mutual authentication and key exchange for low power wireless communication
-
Shim, K. (2003). Cryptanalysis of mutual authentication and key exchange for low power wireless communication. IEEE Communications Letters, 7(5), 248–250.
-
(2003)
IEEE Communications Letters
, vol.7
, Issue.5
, pp. 248-250
-
-
Shim, K.1
-
32
-
-
77649192852
-
A cooperative cellular and broadcast conditional access system for Pay-TV systems
-
Shirazi, H., Cosmas, J., & Cutts, D. (2010). A cooperative cellular and broadcast conditional access system for Pay-TV systems. IEEE Transactions on Broadcasting, 56(1), 44–57.
-
(2010)
IEEE Transactions on Broadcasting
, vol.56
, Issue.1
, pp. 44-57
-
-
Shirazi, H.1
Cosmas, J.2
Cutts, D.3
-
34
-
-
67349156615
-
Standardization activities for IPTV set-top box remote management
-
Wey, J. S., Luken, J., & Heiles, J. (2009). Standardization activities for IPTV set-top box remote management. IEEE Internet Computing, 13(3), 32–39.
-
(2009)
IEEE Internet Computing
, vol.13
, Issue.3
, pp. 32-39
-
-
Wey, J.S.1
Luken, J.2
Heiles, J.3
-
36
-
-
35248840517
-
Security architectures for B3G mobile networks
-
Xenakis, C., & Ntantogian, C. (2007). Security architectures for B3G mobile networks. Telecommunication Systems, 35(3), 123–139.
-
(2007)
Telecommunication Systems
, vol.35
, Issue.3
, pp. 123-139
-
-
Xenakis, C.1
Ntantogian, C.2
-
37
-
-
84879966092
-
Evaluating the energy consumption of the RFID tag collision resolution protocols
-
Yan, X., & Liu, X. (2011). Evaluating the energy consumption of the RFID tag collision resolution protocols. Telecommunication Systems. doi:10.1007/s11235-011-9563-8.
-
(2011)
Telecommunication Systems
-
-
Yan, X.1
Liu, X.2
-
38
-
-
33745780946
-
A new secure key exchange protocol between STB and smart card in DTV broadcasting
-
Yoon, E. J., & Yoo, K. Y. (2006). A new secure key exchange protocol between STB and smart card in DTV broadcasting. In Proceedings of WISI (pp. 165–166).
-
(2006)
Proceedings of WISI
, pp. 165-166
-
-
Yoon, E.J.1
Yoo, K.Y.2
-
39
-
-
62449114806
-
Robust key exchange protocol between set-top box and smart card in DTV broadcasting
-
Yoon, E. J., & Yoo, K. Y. (2009). Robust key exchange protocol between set-top box and smart card in DTV broadcasting. Informatica, 20(1), 39–150.
-
(2009)
Informatica
, vol.20
, Issue.1
, pp. 39-150
-
-
Yoon, E.J.1
Yoo, K.Y.2
-
41
-
-
29344432870
-
Efficient radio resource management in integrated WLAN/CDMA mobile networks
-
Yu, F., & Krishnamurthy, V. (2005). Efficient radio resource management in integrated WLAN/CDMA mobile networks. Telecommunication Systems, 30(1), 177–192.
-
(2005)
Telecommunication Systems
, vol.30
, Issue.1
, pp. 177-192
-
-
Yu, F.1
Krishnamurthy, V.2
-
42
-
-
79952068013
-
TASA: tag-free activity sensing using RFID tag arrays
-
Zhang, D., Zhou, J., Guo, M., & Cao, J. (2011). TASA: tag-free activity sensing using RFID tag arrays. IEEE Transactions on Parallel and Distributed Systems, 22, 558–570.
-
(2011)
IEEE Transactions on Parallel and Distributed Systems
, vol.22
, pp. 558-570
-
-
Zhang, D.1
Zhou, J.2
Guo, M.3
Cao, J.4
|