One-to-many authentication for access control in mobile pay-TV systems
نویسندگان
چکیده
منابع مشابه
Cryptanalysis of a Secure and Efficient Authentication Scheme for Access Control in Mobile Pay-TV Systems
In 2012, Yeh and Tsaur proposed an advanced scheme for access control in mobile pay-TV systems based on pairing and elliptic curve, which were inherent in the cryptography of Sun and Leu’s scheme. In their paper, they pointed out two weaknesses in Sun and Leu’s scheme and tried to overcome these weaknesses. However, we still found that Yeh and Tsaur’s scheme was not secure. In this research, we...
متن کاملAn efficient anonymous authentication protocol for mobile pay-TV
In terms of convenience requirements, mobility has been one of the most important services for pay-TV systems. In 2009, Yang and Chang proposed an authentication protocol for mobile devices using elliptic curves cryptography (ECC) and claimed that their mechanism is secure and efficient using in mobile payTV systems. In this paper, we demonstrate that their protocol still is insecure for authen...
متن کاملAcceptance and Willingness to Pay for Mobile TV Apps
In recent years, smart phone market has risen and the demands of mobile applications increase sharply. Daily mobile applications have shown their great potential and influences throughout mobile commerce. Mobile TV app is one of the most popular mobile applications in the entertainment genre. Advances in 4G mobile network make high-quality mobile TV and video streaming apps prospective. With th...
متن کاملOn the Security of Anonymous Authentication Protocol for Mobile Pay-TV
One of the promising multimedia services is the mobile pay-TV service. Due to its wireless nature, mobile pay-TV is vulnerable to attacks especially during hand-off. In 2011, an efficient anonymous authentication protocol for mobile pay-TV is proposed. The authors claim that their scheme provides an anonymous authentication to users by preventing intruders from obtaining users’ IDs during the m...
متن کاملAuthentication Method Using Hand Images for Access Control systems
The encroachment of information is considered the most important attack that affects the performance of the network. Biometric based authentications have emerged as promising components of information security. Biometric is used for two major purposes: identification and authentication. We propose a palm based authentication method that uses hand images to define a set of referencing points con...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Science China Information Sciences
سال: 2016
ISSN: 1674-733X,1869-1919
DOI: 10.1007/s11432-015-5469-5