One-to-many authentication for access control in mobile pay-TV systems

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptanalysis of a Secure and Efficient Authentication Scheme for Access Control in Mobile Pay-TV Systems

In 2012, Yeh and Tsaur proposed an advanced scheme for access control in mobile pay-TV systems based on pairing and elliptic curve, which were inherent in the cryptography of Sun and Leu’s scheme. In their paper, they pointed out two weaknesses in Sun and Leu’s scheme and tried to overcome these weaknesses. However, we still found that Yeh and Tsaur’s scheme was not secure. In this research, we...

متن کامل

An efficient anonymous authentication protocol for mobile pay-TV

In terms of convenience requirements, mobility has been one of the most important services for pay-TV systems. In 2009, Yang and Chang proposed an authentication protocol for mobile devices using elliptic curves cryptography (ECC) and claimed that their mechanism is secure and efficient using in mobile payTV systems. In this paper, we demonstrate that their protocol still is insecure for authen...

متن کامل

Acceptance and Willingness to Pay for Mobile TV Apps

In recent years, smart phone market has risen and the demands of mobile applications increase sharply. Daily mobile applications have shown their great potential and influences throughout mobile commerce. Mobile TV app is one of the most popular mobile applications in the entertainment genre. Advances in 4G mobile network make high-quality mobile TV and video streaming apps prospective. With th...

متن کامل

On the Security of Anonymous Authentication Protocol for Mobile Pay-TV

One of the promising multimedia services is the mobile pay-TV service. Due to its wireless nature, mobile pay-TV is vulnerable to attacks especially during hand-off. In 2011, an efficient anonymous authentication protocol for mobile pay-TV is proposed. The authors claim that their scheme provides an anonymous authentication to users by preventing intruders from obtaining users’ IDs during the m...

متن کامل

Authentication Method Using Hand Images for Access Control systems

The encroachment of information is considered the most important attack that affects the performance of the network. Biometric based authentications have emerged as promising components of information security. Biometric is used for two major purposes: identification and authentication. We propose a palm based authentication method that uses hand images to define a set of referencing points con...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Science China Information Sciences

سال: 2016

ISSN: 1674-733X,1869-1919

DOI: 10.1007/s11432-015-5469-5