Use of elliptic curves in cryptography
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Implementation of ECC/ECDSA Cryptography Algorithms Based on Java Card
ICDCSW '02 Proceedings of the 22nd International Conference on Distributed Computing Systems
Conditional Access in Mobile Systems: Securing the Application
DFMA '05 Proceedings of the First International Conference on Distributed Frameworks for Multimedia Applications
Broadband multimedia on the move with DVB-H
Multimedia Tools and Applications
A more efficient and secure dynamic ID-based remote user authentication scheme
Computer Communications
Computer Standards & Interfaces
Automated trust negotiation using cryptographic credentials
ACM Transactions on Information and System Security (TISSEC)
An efficient authentication scheme for access control in mobile pay-TV systems
IEEE Transactions on Multimedia
A signature scheme with efficient protocols
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
FrameIDTV: A framework for developing interactive applications on digital television environments
Journal of Network and Computer Applications
Universal authentication protocols for anonymous wireless communications
IEEE Transactions on Wireless Communications
Adaptive security protocol selection for mobile computing
Journal of Network and Computer Applications
Security enhancement on an improvement on two remote user authentication schemes using smart cards
Future Generation Computer Systems
Implementing cryptographic pairings on smartcards
CHES'06 Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems
Flexible-Pay-Per-Channel: A New Model for Content Access Control in Pay-TV Broadcasting Systems
IEEE Transactions on Multimedia
Privacy and non-repudiation on pay-TV systems
IEEE Transactions on Consumer Electronics
Pay-TV system with strong privacy and non-repudiation protection
IEEE Transactions on Consumer Electronics
IEEE Transactions on Consumer Electronics
Enhanced authentication for commercial video services
Security and Communication Networks
Hi-index | 0.00 |
In terms of convenience requirements, mobility has been one of the most important services for pay-TV systems. In 2009, Yang and Chang proposed an authentication protocol for mobile devices using elliptic curves cryptography (ECC) and claimed that their mechanism is secure and efficient using in mobile pay-TV systems. In this paper, we demonstrate that their protocol still is insecure for authentication without password protection and performs inefficiently. Therefore, we offer an anonymous authentication protocol (AAP) to solve the performance issue and insecure risks. In addition, we present an analysis of our protocol to show that our protocol suits better for applications with higher security requirements and low power-consuming devices.