Secure and Efficient Access Control Protocol in Digital Broadcasting System
نویسندگان
چکیده
منابع مشابه
Secure Communication in Digital TV Broadcasting
To provide subscription-based Digital TV (DTV) data, services providers scramble the data stream (program content) with some secure measures such as ECM and EMM via using control words, and send the stream to conditional access system (CAS) in the set-top box (STB). Smart card is used to decrypt the control words and accordingly to enable the STB to descramble the scrambled signal. Therefore, s...
متن کاملQuick NAP - Secure and Efficient Network Access Protocol
Current network access protocol stacks consist of a number of layers and components that are only loosely aware of each other. While this provides flexibility, it also results in a number of limitations, including high signaling latency due to duplicated tasks at multiple layers, vulnerabilities, and deployment problems when new components and protocols are added. Most of currently ongoing work...
متن کاملA Secure Access Control system in Cloud
Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal health information could be exposed to those third party servers and to unauthorized parties. To assure the patients' control over access to their own PHRs, i...
متن کاملDigital Video Broadcasting Conditional Access Architecture
Digital Video Broadcasting (DVB) is a standard defining a one-to-many unidirectional data network for sending digital TV programs over satellite, cable, and other topologies. The standard enables the broadcasting industry to offer hundreds of pay-TV channels to consumers. The expanded capacities make the broadcast signals more valuable and attractive to signal thefts [1]. To protect a DVB data-...
متن کاملProvably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Journal of the Korea Contents Association
سال: 2010
ISSN: 1598-4877
DOI: 10.5392/jkca.2010.10.3.032