The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Seamless Video Service is a new service mode, providing video services to users at any time and any place. In seamless content delivery system, the authentication & authorization protocol is an essential problem to be solved. In this paper, an authentication & authorization protocol suitable for seamless video services with light weight certificate, namely SVSAAP is proposed. Through the analysis...
For interactive TV (ITV) services in converged network, the DVB-based DTV and the IP-based IPTV coexist in a single dual mode set-top box (STB) and the traditional one-way DVB-CA cannot be adapted to the variation. In this paper, a simplified and secure conditional access scheme based on the simplified double layer is proposed to realize authentication and access control between servers and STBs....
In this paper, we propose a novel three party authentication scheme which could realize the mutual authentication among the involved parities (service provider, terminal and smart-card), and our scheme can be used for more fair-use oriented DRM scheme framework design. The scheme is highly efficient and secure, and it's immune to many existing attacks.
In this paper, we redefine the roles in Mobile-TV systems from two parties(service provider and user) to three par-ties(network operator, content provider and user). Afterwards, we concentrate our discussion on service authentication problem in three-party model. Our proposed scheme is based on Identity Based Encryption(IBE) scheme, give a novel way to solve the mutual authentication and batch authentication...
Broadcast encryption schemes are suitable for one-way content distribution and protection applications.However, most of the related papers are from the theoretical point of view, and there is something useful for implementation being overlooked. In this paper, we introduce the pay-TV system as a concrete implementation of broadcast encryption schemes, and simulate the transmission performance of four...
Wireless sensor networks (WSNs) are highly vulnerable to attacks for the limitation of constrained resource and communicating via wireless links, especially running in a hostile environment such as battlefields. In such situation, an adversary may capture any node compromising critical security data including keys used for confidentiality and authentication. Consequently, it is necessary to provide...
Though the security of wireless sensor networks (WSNs) has been studied deeply, the inside attacks still are very difficult to defend. The inside attacks are not detectable with only the classic cryptographic techniques and the attacks mainly include two types of attack: exceptional message attack and abnormal behavior attack. In this paper, we present an inside attacker detection approach, which...
P2P content sharing is often blamed for copyright infringement, making the establishment of content security technologies an urgent need. A PCP (P2P-based content protection) system is proposed in this paper. The system is based on a trust model that focuses on content security, rights management and access control in P2P network. Encryption, digital watermarking, and packaging technologies are adopted...
In broad TV network, the broadcasting will coexist with interactive services in a single set-top-box (STB) device and the traditional unidirectional conditional access system (CAS) in DVB can't be adapted to the variation. The dual-CAS is designed based on a double layer security scheme proposed in this paper to implement the authentication and access control, key updates between servers and STBs...
In this paper, we introduce a novel way to solve the tradeoff problem about communication/storage/computation overhead of broadcast encryption scheme. We construct a new scheme based on subset difference (SD) scheme, use concept of RSA accumulator and the idea of separating the user-side device into different function parts, take advantage of the public device's functionality, minimize the storage...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.