Practical performance of Bloom filters and parallel free-text searching
Communications of the ACM
Summary cache: a scalable wide-area Web cache sharing protocol
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
A second look at bloom filters
Communications of the ACM
Space/time trade-offs in hash coding with allowable errors
Communications of the ACM
OceanStore: an architecture for global-scale persistent storage
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Identity-Based Encryption from the Weil Pairing
SIAM Journal on Computing
Short Signatures from the Weil Pairing
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
A One Round Protocol for Tripartite Diffie–Hellman
Journal of Cryptology
An efficient authentication scheme for access control in mobile pay-TV systems
IEEE Transactions on Multimedia
Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks
International Journal of Security and Networks
An efficient anonymous authentication protocol for mobile pay-TV
Journal of Network and Computer Applications
Efficient key distribution schemes for secure media delivery in pay-TV systems
IEEE Transactions on Multimedia
Efficient Key Distribution for Access Control in Pay-TV Systems
IEEE Transactions on Multimedia
Flexible-Pay-Per-Channel: A New Model for Content Access Control in Pay-TV Broadcasting Systems
IEEE Transactions on Multimedia
Improvements on Sun 's Conditional Access System in Pay-TV Broadcasting Systems
IEEE Transactions on Multimedia
The Tate pairing and the discrete logarithm applied to elliptic curve cryptosystems
IEEE Transactions on Information Theory
Reducing elliptic curve logarithms to logarithms in a finite field
IEEE Transactions on Information Theory
Privacy and non-repudiation on pay-TV systems
IEEE Transactions on Consumer Electronics
Analysis of privacy and non-repudiation on pay-TV systems
IEEE Transactions on Consumer Electronics
Pay-TV system with strong privacy and non-repudiation protection
IEEE Transactions on Consumer Electronics
Sharing conditional access modules through the home network for pay TV access
IEEE Transactions on Consumer Electronics
Hi-index | 0.00 |
The advance in information technology has made video service a market with great commercial value. As an example, in-vehicle infotainment has been introduced to vehicles with which customers can enjoy subscribed media services wherever they are. This paper investigates the authentication in commercial video services using a recently proposed protocol, the Sun–Leu protocol, as baseline. Several important security and performance requirements are revisited, including mutual authentication, anonymous authentication, one-to-many delivery, low communication cost and the security against replay attacks. We provide a detailed analysis of the Sun–Leu protocol against these requirements, based on which an enhanced authentication scheme is proposed. The new scheme is designed within the framework of the Sun–Leu protocol, preserves all merits of the original protocol and provides a higher level of security for video communication services. Copyright © 2012 John Wiley & Sons, Ltd.