Secure and Efficient Access Control Protocol in Digital Broadcasting System

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Communication in Digital TV Broadcasting

To provide subscription-based Digital TV (DTV) data, services providers scramble the data stream (program content) with some secure measures such as ECM and EMM via using control words, and send the stream to conditional access system (CAS) in the set-top box (STB). Smart card is used to decrypt the control words and accordingly to enable the STB to descramble the scrambled signal. Therefore, s...

متن کامل

Quick NAP - Secure and Efficient Network Access Protocol

Current network access protocol stacks consist of a number of layers and components that are only loosely aware of each other. While this provides flexibility, it also results in a number of limitations, including high signaling latency due to duplicated tasks at multiple layers, vulnerabilities, and deployment problems when new components and protocols are added. Most of currently ongoing work...

متن کامل

A Secure Access Control system in Cloud

Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal health information could be exposed to those third party servers and to unauthorized parties. To assure the patients' control over access to their own PHRs, i...

متن کامل

Digital Video Broadcasting Conditional Access Architecture

Digital Video Broadcasting (DVB) is a standard defining a one-to-many unidirectional data network for sending digital TV programs over satellite, cable, and other topologies. The standard enables the broadcasting industry to offer hundreds of pay-TV channels to consumers. The expanded capacities make the broadcast signals more valuable and attractive to signal thefts [1]. To protect a DVB data-...

متن کامل

Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC

Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The Journal of the Korea Contents Association

سال: 2010

ISSN: 1598-4877

DOI: 10.5392/jkca.2010.10.3.032