Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Seamless Video Service is a new service mode, providing video services to users at any time and any place. In seamless content delivery system, the authentication & authorization protocol is an essential problem to be solved. In this paper, an authentication & authorization protocol suitable for seamless video services with light weight certificate, namely SVSAAP is proposed. Through the analysis...
For interactive TV (ITV) services in converged network, the DVB-based DTV and the IP-based IPTV coexist in a single dual mode set-top box (STB) and the traditional one-way DVB-CA cannot be adapted to the variation. In this paper, a simplified and secure conditional access scheme based on the simplified double layer is proposed to realize authentication and access control between servers and STBs....
In this paper, we propose a novel three party authentication scheme which could realize the mutual authentication among the involved parities (service provider, terminal and smart-card), and our scheme can be used for more fair-use oriented DRM scheme framework design. The scheme is highly efficient and secure, and it's immune to many existing attacks.
In this paper, we redefine the roles in Mobile-TV systems from two parties(service provider and user) to three par-ties(network operator, content provider and user). Afterwards, we concentrate our discussion on service authentication problem in three-party model. Our proposed scheme is based on Identity Based Encryption(IBE) scheme, give a novel way to solve the mutual authentication and batch authentication...
Broadcast encryption schemes are suitable for one-way content distribution and protection applications.However, most of the related papers are from the theoretical point of view, and there is something useful for implementation being overlooked. In this paper, we introduce the pay-TV system as a concrete implementation of broadcast encryption schemes, and simulate the transmission performance of four...
Wireless sensor networks (WSNs) are highly vulnerable to attacks for the limitation of constrained resource and communicating via wireless links, especially running in a hostile environment such as battlefields. In such situation, an adversary may capture any node compromising critical security data including keys used for confidentiality and authentication. Consequently, it is necessary to provide...
Though the security of wireless sensor networks (WSNs) has been studied deeply, the inside attacks still are very difficult to defend. The inside attacks are not detectable with only the classic cryptographic techniques and the attacks mainly include two types of attack: exceptional message attack and abnormal behavior attack. In this paper, we present an inside attacker detection approach, which...
P2P content sharing is often blamed for copyright infringement, making the establishment of content security technologies an urgent need. A PCP (P2P-based content protection) system is proposed in this paper. The system is based on a trust model that focuses on content security, rights management and access control in P2P network. Encryption, digital watermarking, and packaging technologies are adopted...
In broad TV network, the broadcasting will coexist with interactive services in a single set-top-box (STB) device and the traditional unidirectional conditional access system (CAS) in DVB can't be adapted to the variation. The dual-CAS is designed based on a double layer security scheme proposed in this paper to implement the authentication and access control, key updates between servers and STBs...
In this paper, we introduce a novel way to solve the tradeoff problem about communication/storage/computation overhead of broadcast encryption scheme. We construct a new scheme based on subset difference (SD) scheme, use concept of RSA accumulator and the idea of separating the user-side device into different function parts, take advantage of the public device's functionality, minimize the storage...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.