-
2
-
-
79956133331
-
An efficient anonymous authentication protocol for mobile pay-TV
-
Chen T-H, Chen Y-C, Shih W-K, Wei H-W (2011) An efficient anonymous authentication protocol for mobile pay-TV. J Netw Comput Appl 34(4):1131–1137
-
(2011)
J Netw Comput Appl
, vol.34
, Issue.4
, pp. 1131-1137
-
-
Chen, T.-H.1
Chen, Y.-C.2
Shih, W.-K.3
Wei, H.-W.4
-
3
-
-
84953642772
-
ITU-R Rec
-
Conditional-Access Broadcasting System (1992) ITU-R Rec. 810
-
(1992)
810
-
-
System, C.-A.B.1
-
4
-
-
84953642773
-
IP datacast over DVB-H: service purchase and protection
-
Digital Video Broadcasting (DVB) (2007) IP datacast over DVB-H: service purchase and protection, ETSI TS 102 474 v1.1.1 Std
-
(2007)
ETSI TS 102 474 v1.1.1 Std
-
-
Broadcasting, D.V.1
-
5
-
-
84902245219
-
Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
-
Farash M-S, Attari M-A (2013) Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC. ISC Int J Inform Secur 5(1):18–43
-
(2013)
ISC Int J Inform Secur
, vol.5
, Issue.1
, pp. 18-43
-
-
Farash, M.-S.1
Attari, M.-A.2
-
6
-
-
84890424682
-
An enhanced authenticated key agreement for session initiation protocol
-
Farash M-S, Attari M-A (2013) An enhanced authenticated key agreement for session initiation protocol. Inf Technol Control 42(4):333–342
-
(2013)
Inf Technol Control
, vol.42
, Issue.4
, pp. 333-342
-
-
Farash, M.-S.1
Attari, M.-A.2
-
7
-
-
84899645425
-
Cryptanalysis and improvement of a chaotic maps-based key agreement protocol using Chebyshev sequence membership testing
-
Farash M-S, Attari M-A (2013) Cryptanalysis and improvement of a chaotic maps-based key agreement protocol using Chebyshev sequence membership testing. Nonlinear Dyn 76(2):1203–1213
-
(2013)
Nonlinear Dyn
, vol.76
, Issue.2
, pp. 1203-1213
-
-
Farash, M.-S.1
Attari, M.-A.2
-
8
-
-
84902266968
-
An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps
-
Farash M-S, Attari M-A (2014) An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps. Nonlinear Dyn 77(1-2):399–411
-
(2014)
Nonlinear Dyn
, vol.77
, Issue.1-2
, pp. 399-411
-
-
Farash, M.-S.1
Attari, M.-A.2
-
9
-
-
84902778355
-
An enhanced and secure three-party password-based authenticated key exchange protocol without using server’s public-keys and symmetric cryptosystems
-
Farash M-S, Attari M-A (2014) An enhanced and secure three-party password-based authenticated key exchange protocol without using server’s public-keys and symmetric cryptosystems. Inf Technol Control 43 (2):143–150
-
(2014)
Inf Technol Control
, vol.43
, Issue.2
, pp. 143-150
-
-
Farash, M.-S.1
Attari, M.-A.2
-
10
-
-
84919877584
-
Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography
-
Farash M-S, Attari M-A (2014) Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography. J Supercomput. doi:10.1007/s11227-014-1272-0
-
(2014)
J Supercomput
-
-
Farash, M.-S.1
Attari, M.-A.2
-
11
-
-
84919877261
-
An efficient client-client password-based authentication scheme with provable security
-
Farash M-S, Attari M-A (2014) An efficient client-client password-based authentication scheme with provable security. J Supercomput. doi:10.1007/s11227-014-1273-z
-
(2014)
J Supercomput
-
-
Farash, M.-S.1
Attari, M.-A.2
-
12
-
-
84893678218
-
A pairing-free ID-based key agreement protocol with different PKGs
-
Farash M-S, Attari M-A (2014) A pairing-free ID-based key agreement protocol with different PKGs. Int J Netw Secur 16(2):143–148
-
(2014)
Int J Netw Secur
, vol.16
, Issue.2
, pp. 143-148
-
-
Farash, M.-S.1
Attari, M.-A.2
-
13
-
-
84905565168
-
secure and efficient identity-based authenticated key exchange protocol for mobile client-server networks
-
Farash M-S, Attari M-A (2014) secure and efficient identity-based authenticated key exchange protocol for mobile client-server networks. J Supercomput 69(1):395–411
-
(2014)
J Supercomput
, vol.69
, Issue.1
, pp. 395-411
-
-
Farash, M.-S.1
Attari, M.-A.2
-
14
-
-
84899624931
-
A certificateless multiple-key agreement protocol without one-way hash functions based on bilinear pairings
-
Farash M-S, Attari M-A, Bayat M (2012) A certificateless multiple-key agreement protocol without one-way hash functions based on bilinear pairings. IACSIT Int J Eng Technol 4(3):321–325
-
(2012)
IACSIT Int J Eng Technol
, vol.4
, Issue.3
, pp. 321-325
-
-
Farash, M.-S.1
Attari, M.-A.2
Bayat, M.3
-
15
-
-
79955735535
-
Vulnerability of two multiple-key agreement protocols
-
Farash M-S, Bayat M, Attari M-A (2011) Vulnerability of two multiple-key agreement protocols. Comput Electr Eng 37(2):199–204
-
(2011)
Comput Electr Eng
, vol.37
, Issue.2
, pp. 199-204
-
-
Farash, M.-S.1
Bayat, M.2
Attari, M.-A.3
-
16
-
-
84876280558
-
A new efficient authenticated multiple-key exchange protocol from bilinear pairings
-
Farash M-S, Attari M-A, Atani R-E, Jami M (2013) A new efficient authenticated multiple-key exchange protocol from bilinear pairings. Comput Electr Eng 39(2):530–541
-
(2013)
Comput Electr Eng
, vol.39
, Issue.2
, pp. 530-541
-
-
Farash, M.-S.1
Attari, M.-A.2
Atani, R.-E.3
Jami, M.4
-
17
-
-
84868022142
-
Enhanced authentication for commercial video services
-
Huang X, Chu C-K, Sun H-M, Zhou J, Deng R-H (2012) Enhanced authentication for commercial video services. Secur Commun Netw 5(11):1248–1259
-
(2012)
Secur Commun Netw
, vol.5
, Issue.11
, pp. 1248-1259
-
-
Huang, X.1
Chu, C.-K.2
Sun, H.-M.3
Zhou, J.4
Deng, R.-H.5
-
18
-
-
67349168446
-
BAT: a robust signature scheme for vehicular networks using binary authentication tree
-
Jiang Y, Shi M, Shen X, Lin C (2009) BAT: a robust signature scheme for vehicular networks using binary authentication tree. IEEE Trans Wirel Commun 8(4):1974–1983
-
(2009)
IEEE Trans Wirel Commun
, vol.8
, Issue.4
, pp. 1974-1983
-
-
Jiang, Y.1
Shi, M.2
Shen, X.3
Lin, C.4
-
19
-
-
77952263995
-
Improvements on Sun’s conditional access system in pay-TV broadcasting systems
-
Kim J-Y, Choi H-K (2010) Improvements on Sun’s conditional access system in pay-TV broadcasting systems. IEEE Trans Multimedia 12(4):337–340
-
(2010)
IEEE Trans Multimedia
, vol.12
, Issue.4
, pp. 337-340
-
-
Kim, J.-Y.1
Choi, H.-K.2
-
20
-
-
0034140141
-
Privacy and non-repudiation on pay-TV systems
-
Lee N, Chang C, Lin C, Hwang T. (2000) Privacy and non-repudiation on pay-TV systems. IEEE Trans Consum Electron 46(1):20–27
-
(2000)
IEEE Trans Consum Electron
, vol.46
, Issue.1
, pp. 20-27
-
-
Lee, N.1
Chang, C.2
Lin, C.3
Hwang, T.4
-
21
-
-
84874319277
-
A privacy?preserving acceleration authentication protocol for mobile pay-TV systems
-
Liu X, Zhang Y (2013) A privacy?preserving acceleration authentication protocol for mobile pay-TV systems. Secur Commun Netw 6(3):361–372
-
(2013)
Secur Commun Netw
, vol.6
, Issue.3
, pp. 361-372
-
-
Liu, X.1
Zhang, Y.2
-
22
-
-
0024717044
-
A single conditional access system for satellite-cable and terrestrial TV
-
Michon V, Coutrot F (1989) A single conditional access system for satellite-cable and terrestrial TV. IEEE Trans Consum Electron 35(3):464
-
(1989)
IEEE Trans Consum Electron
, vol.35
, Issue.3
, pp. 464
-
-
Michon, V.1
Coutrot, F.2
-
23
-
-
84927727752
-
Security proofs for signature schemes
-
Springer, Heidelberg
-
Pointcheval D, Stern J (1996) Security proofs for signature schemes. In: Maurer U M (ed) EUROCRYPT 1996. LNCS, vol 1070. Springer, Heidelberg, pp 387–398
-
(1996)
EUROCRYPT 1996. LNCS
, vol.1070
, pp. 387-398
-
-
Pointcheval, D.1
Stern, J.2
Maurer, U.M.3
-
25
-
-
0042196056
-
Pay-TV system with strong privacy and non-repudiation protection
-
Song R, Korba L (2003) Pay-TV system with strong privacy and non-repudiation protection. IEEE Trans Consum Electron 49(2):408–413
-
(2003)
IEEE Trans Consum Electron
, vol.49
, Issue.2
, pp. 408-413
-
-
Song, R.1
Korba, L.2
-
26
-
-
68549115315
-
An efficient authentication scheme for access control in mobile pay-TV systems
-
Sun H-M, Leu M-C (2009) An efficient authentication scheme for access control in mobile pay-TV systems. IEEE Trans Multimedia 11(5):947–959
-
(2009)
IEEE Trans Multimedia
, vol.11
, Issue.5
, pp. 947-959
-
-
Sun, H.-M.1
Leu, M.-C.2
-
27
-
-
54949102324
-
Flexible-pay-per-channel: a new model for content access control in pay-TV broadcasting systems
-
Sun H-M, Chen C-M, Shieh C-Z (2008) Flexible-pay-per-channel: a new model for content access control in pay-TV broadcasting systems. IEEE Trans Multimedia 10(6):1109–1120
-
(2008)
IEEE Trans Multimedia
, vol.10
, Issue.6
, pp. 1109-1120
-
-
Sun, H.-M.1
Chen, C.-M.2
Shieh, C.-Z.3
-
28
-
-
41549131381
-
Efficient key distribution for access control in pay-TV systems
-
Wang S-Y, Laih C-S (2008) Efficient key distribution for access control in pay-TV systems. IEEE Trans Multimedia 10(3):480–492
-
(2008)
IEEE Trans Multimedia
, vol.10
, Issue.3
, pp. 480-492
-
-
Wang, S.-Y.1
Laih, C.-S.2
-
29
-
-
84878354791
-
Improved one-to-many authentication scheme for access control in pay-TV systems
-
Wang H, Qin B (2012) Improved one-to-many authentication scheme for access control in pay-TV systems. IET Inf Secur 6(4):281–290
-
(2012)
IET Inf Secur
, vol.6
, Issue.4
, pp. 281-290
-
-
Wang, H.1
Qin, B.2
-
30
-
-
63049116480
-
An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
-
Yang J-H, Chang C-C (2009) An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Comput secur 28(3):138–143
-
(2009)
Comput secur
, vol.28
, Issue.3
, pp. 138-143
-
-
Yang, J.-H.1
Chang, C.-C.2
-
31
-
-
84870495205
-
A secure and efficient authentication scheme for access control in mobile pay-TV systems
-
Yeh L-Y, Tsaur W (2012) A secure and efficient authentication scheme for access control in mobile pay-TV systems. IEEE Trans Multimedia 14(6):1690–1693
-
(2012)
IEEE Trans Multimedia
, vol.14
, Issue.6
, pp. 1690-1693
-
-
Yeh, L.-Y.1
Tsaur, W.2
-
32
-
-
16244398861
-
A multikey secure multimedia proxy using asymmetric reversible parametric sequences: theory, design, and implementation
-
Yeung S-F, Lui J-C, Yau D-K (2005) A multikey secure multimedia proxy using asymmetric reversible parametric sequences: theory, design, and implementation. IEEE Trans Multimedia 7(2):330–338
-
(2005)
IEEE Trans Multimedia
, vol.7
, Issue.2
, pp. 330-338
-
-
Yeung, S.-F.1
Lui, J.-C.2
Yau, D.-K.3
|