|
[1]F. Coutrot and V. Michon, “A Single Conditional Access System for Satellite-Cable and Terrestrial TV,” IEEE Trans. Consum. Electron., vol. 35, no. 3, pp. 464–468, Aug. 1989. [2]ITU-R Rec. 810., Conditional-Access Broadcasting Systems. 1992. [3]DVB Standrad, IP Datacast over DVB-H: Service Purchase and Protection (SPP). 2005. [4]D. Diaz-Sanchez, A. Marin, F. Almenarez, and A. Cortes, “Sharing Conditional Access Modules Through the Home Network for Pay TV Access,” IEEE Trans. Consum. Electron., vol. 55, no. 1, pp. 88–96, Feb. 2009. [5]H. Shirazi, J. Cosmas, and D. Cutts, “A Cooperative Cellular and Broadcast Conditional Access System for Pay-TV Systems,” IEEE Trans. Broadcast., vol. 56, no. 1, pp. 44–57, Mar. 2010. [6]J.-Y. Kim and H.-K. Choi, “Improvements on Sun ’s Conditional Access System in Pay-TV Broadcasting Systems,” IEEE Trans. Multimed., vol. 12, no. 4, pp. 337–340, Jun. 2010. [7]H. Wang and B. Qin, “Improved One-to-Many Authentication Scheme for Access Control in Pay-TV Systems,” IET Inf. Secur., vol. 6, no. 4, pp. 281–290, Dec. 2012. [8]H.-M. Sun and M.-C. Leu, “An Efficient Authentication Scheme for Access Control in Mobile Pay-TV Systems,” IEEE Trans. Multimed., vol. 11, no. 5, pp. 947–959, Aug. 2009. [9]C.-C. Chang, T.-F. Cheng, and H.-L. Wu, “An Authentication and Key Agreement Protocol for Satellite Communications,” Int. J. Commun. Syst., vol. 27, no. 10, pp. 1994–2006, Oct. 2014. [10]S. H. Islam and M. K. Khan, “Provably Secure and Pairing-Free Identity-Based Handover Authentication Protocol for Wireless Mobile Networks,” Int. J. Commun. Syst., vol. 29, no. 17, pp. 2442–2456, Nov. 2016. [11]S. H. Islam, M. S. Obaidat, and R. Amin, “An Anonymous and Provably Secure Authentication Scheme for Mobile User,” Int. J. Commun. Syst., vol. 29, no. 9, pp. 1529–1544, Jun. 2016. [12]Y.-L. Huang, S. Shieh, F.-S. Ho, and J.-C. Wang, “Efficient Key Distribution Schemes for Secure Media Delivery in Pay-TV Systems,” IEEE Trans. Multimed., vol. 6, no. 5, pp. 760–769, Oct. 2004. [13]H.-M. Sun, C.-M. Chen, and C.-Z. Shieh, “Flexible-Pay-Per-Channel: A New Model for Content Access Control in Pay-TV Broadcasting Systems,” IEEE Trans. Multimed., vol. 10, no. 6, pp. 1109–1120, Oct. 2008. [14]N.-Y. Lee, C.-C. Chang, C.-L. Lin, and T. Hwang, “Privacy and Non-Repudiation on Pay-TV Systems,” IEEE Trans. Consum. Electron., vol. 46, no. 1, pp. 20–27, Feb. 2000. [15]R. Song and L. Korba, “Pay-TV system with strong privacy and non-repudiation protection,” IEEE Trans. Consum. Electron., vol. 49, no. 2, pp. 408–413, May 2003. [16]H. Roh and S. Jung, “An Authentication Scheme for Consumer Electronic Devices Accessing Mobile IPTV Service from Home Networks,” in 2011 IEEE International Conference on Consumer Electronics (ICCE), 2011, pp. 717–718. [17]J.-H. Yang and C.-C. Chang, “An ID-based Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices on Elliptic Curve Cryptosystem,” Comput. Secur., vol. 28, no. 3, pp. 138–143, May 2009. [18]H.-L. Wu, C.-C. Chang, and C.-Y. Sun, “A Secure Authentication Scheme with Provable Correctness for Pay-TV Systems,” Secur. Commun. Netw., vol. 9, no. 11, pp. 1577–1588, Jul. 2016. [19]V. Ollikainen and C. Peng, “A Handover Approach to DVB-H Services,” in 2006 IEEE International Conference on Multimedia and Expo, 2006, pp. 629–632. [20]T.-H. Chen, Y.-C. Chen, W.-K. Shih, and H.-W. Wei, “An Efficient Anonymous Authentication Protocol for Mobile Pay-TV,” J. Netw. Comput. Appl., vol. 34, no. 4, pp. 1131–1137, Jul. 2011. [21]H. Kim, Cryptanalysis on An Efficient Anonymous Authentication Protocol for Mobile Pay-TV, vol. 164. Springer, Heidelberg: James (Jong Hyuk) Park, Victor C.M. Leung, Cho-Li Wang, Taeshik Shon (eds.), 2012. [22]X. Huang, C.-K. Chu, H.-M. Sun, J. Zhou, and R. H. Deng, “Enhanced Authentication for Commercial Video Services,” Secur. Commun. Netw., vol. 5, no. 11, pp. 1248–1259, Nov. 2012. [23]L.-Y. Yeh and W.-J. Tsaur, “A Secure and Efficient Authentication Scheme for Access Control in Mobile Pay-TV Systems,” IEEE Trans. Multimed., vol. 14, no. 6, pp. 1690–1693, Dec. 2012. [24]D. He, N. Kumar, H. Shen, and J.-H. Lee, “One-to-Many Authentication for Access Control in Mobile Pay-TV Systems,” Sci. China Inf. Sci., vol. 59, no. 5, p. 052108, May 2016. [25]D. He, J. Chen, and R. Zhang, “An Efficient Identity-Based Blind Signature Scheme Without Bilinear Pairings,” Comput. Electr. Eng., vol. 37, no. 4, pp. 444–450, Jul. 2011. [26]A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, 1st ed. Boca Raton, FL, USA: CRC Press, Inc., 1996. [27]D. Boneh and M. Franklin, “Identity-Based Encryption from the Weil Pairing,” in Advances in Cryptology — CRYPTO 2001, 2001, pp. 213–229. [28]FIPS PUB 180-4., Secure Hash Standard. 2012. [29]R. Song and M. R. Lyu, “Analysis of Privacy and Non-Repudiation on Pay-TV Systems,” IEEE Trans. Consum. Electron., vol. 47, no. 4, pp. 729–733, Nov. 2001. [30]S.-Y. Wang and C.-S. Laih, “Efficient Key Distribution for Access Control in Pay-TV Systems,” IEEE Trans. Multimed., vol. 10, no. 3, pp. 480–492, Apr. 2008. [31]L.-Y. Yeh and J.-L. Huang, “A Conditional Access System with Efficient Key Distribution and Revocation for Mobile pay-TV Systems,” ACM Trans Multimed. Comput Commun Appl, vol. 9, no. 3, p. 18:1–18:20, Jul. 2013. [32]H. Kim and S.-W. Lee, “Anonymous Authentication Protocol for Mobile Pay-TV System,” in Computer Applications for Security, Control and System Engineering, Springer, Berlin, Heidelberg, 2012, pp. 471–478. [33]W. I. Khedr, “On the Security of Anonymous Authentication Protocol for Mobile Pay-TV,” J. Inf. Secur., vol. 04, no. 04, p. 225, Sep. 2013. [34]M. S. Farash and M. A. Attari, “A Provably Secure and Efficient Authentication Scheme for Access Control in Mobile Pay-TV Systems,” Multimed. Tools Appl., vol. 75, no. 1, pp. 405–424, Jan. 2016. [35]D. Dolev and A. C. Yao, “On the Security of Public Key Protocols,” in Proceedings of the 22Nd Annual Symposium on Foundations of Computer Science, Washington, DC, USA, 1981, pp. 350–357. [36]J.-W. Lee, “Key Distribution and Management for Conditional Access System on DBS,” in Proceedings of International Conference on Cryptology and Information Security, Kaohsiung, Taiwan, 1996, pp. 82–86. [37]F.-K. Tu, C.-S. Laih, and H.-H. Tung, “On Key Distribution Management for Conditional Access System on Pay-TV System,” IEEE Trans. Consum. Electron., vol. 45, no. 1, pp. 151–158, Feb. 1999. [38]R. L. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public-key Cryptosystems,” Commun ACM, vol. 21, no. 2, pp. 120–126, Feb. 1978. [39]D. Xiao, X. Liao, and K. W. Wong, “An Efficient Entire Chaos-Based Scheme for Deniable Authentication,” Chaos Solitons Fractals, vol. 23, no. 4, pp. 1327–1331, Feb. 2005. [40]H. Jin, D. S. Wong, and Y. Xu, “Efficient Group Signature with Forward Secure Revocation,” in Security Technology, 2009, pp. 124–131. [41]“Data Encryption Standard,” Wikipedia. 19-Jan-2018. [42]M. Burrows, M. Abadi, and R. Needham, “A Logic of Authentication,” ACM Trans Comput Syst, vol. 8, no. 1, pp. 18–36, Feb. 1990. [43]M. Burrows, M. Abadi, and R. Needham, Authentication: a Practical Study in Belief and Action. University of Cambridge Computer Laboratory, 1988. [44]W.-J. Tsaur, J.-H. Li, and W.-B. Lee, “An Efficient and Secure Multi-Server Authentication Scheme with Key Agreement,” J. Syst. Softw., vol. 85, no. 4, pp. 876–882, Apr. 2012. [45]S.-P. Yang and X. Li, “Defect in Protocol Analysis with BAN Logic on Man-in-the-middle Attacks,” Appl. Res. Comput., vol. 24, no. 3, pp. 149–151, 2007. [46]W. Diffie and M. E. Hellman, “New Directions in Cryptography,” IEEE Trans. Inf. Theory, vol. 22, no. 6, pp. 644–654, Nov. 1976. [47]C.-C. Lee, “A Simple Key Agreement Scheme Based on Chaotic Maps for VSAT Satellite Communications,” Int. J. Satell. Commun. Netw., vol. 31, no. 4, pp. 177–186, Jul. 2013. [48]B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edition. New York: Wiley, 1996. [49]L. Atzori, A. Iera, and G. Morabito, “The Internet of Things: A survey,” Comput. Netw., vol. 54, no. 15, pp. 2787–2805, Oct. 2010. [50]Y.-P. Liao and C.-M. Hsiao, “A Secure ECC-Based RFID Authentication Scheme Integrated with ID-Verifier Transfer Protocol,” Ad Hoc Netw., vol. 18, pp. 133–146, Jul. 2014. [51]M. Turkanović, B. Brumen, and M. Hölbl, “A Novel User Authentication and Key Agreement Scheme for Heterogeneous ad Hoc Wireless Sensor Networks, Based on the Internet of Things Notion,” Ad Hoc Netw., vol. 20, pp. 96–112, Sep. 2014. [52]M. S. Farash, M. Turkanović, S. Kumari, and M. Hölbl, “An Efficient User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Network Tailored for the Internet of Things Environment,” Ad Hoc Netw., vol. 36, pp. 152–176, Jan. 2016. [53]S. Kalra and S. K. Sood, “Secure Authentication Scheme for IoT and Cloud Servers,” Pervasive Mob. Comput., vol. 24, pp. 210–223, Dec. 2015. [54]V. S. Miller, “Use of Elliptic Curves in Cryptography,” in Advances in Cryptology — CRYPTO ’85 Proceedings, 1985, pp. 417–426. [55]N. Koblitz, “Elliptic Curve Cryptosystems,” Math. Comput., vol. 48, no. 177, pp. 203–209, 1987. [56]C. Guo, C.-C. Chang, and C.-Y. Sun, “Chaotic Maps-Based Mutual Authentication and Key Agreement using Smart Cards for Wireless Communications,” J. Inf. Hiding Multimed. Signal Process., vol. 4, no. 2, pp. 99–109, 2013. [57]W.-S. Juang, S.-T. Chen, and H.-T. Liaw, “Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards,” IEEE Trans. Ind. Electron., vol. 55, no. 6, pp. 2551–2556, Jun. 2008. [58]X. Li, W. Qiu, D. Zheng, K. Chen, and J. Li, “Anonymity Enhancement on Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards,” IEEE Trans. Ind. Electron., vol. 57, no. 2, pp. 793–800, Feb. 2010. [59]C.-C. Chang and L.-H. Wu, “Password Authentication Scheme Based upon Rabin’s Public-key Cryptosystem,” presented at the Proceedings of International Conference on Systems Management, Hong Kong, China, 1990, pp. 425–429. [60]M.-S. Hwang and L.-H. Li, “A New Remote User Authentication Scheme Using Smart Cards,” IEEE Trans. Consum. Electron., vol. 46, no. 1, pp. 28–30, Feb. 2000. [61]W. Rankl and W. Effing, Smart Card Handbook, 1st ed. New York, NY, USA: John Wiley & Sons, Inc., 1997. [62]Q. Zhao and C.-H. Hsieh, “Card User Authentication Based on Generalized Image Morphing,” in 2011 3rd International Conference on Awareness Science and Technology (iCAST), 2011, pp. 117–122. [63]K. Thongkor and T. Amornraksa, “Digital Image Watermarking for Photo Authentication in Thai National ID Card,” in 2012 9th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology, 2012, pp. 1–4. [64]T. N. Shankar, G. Sahoo, and S. Niranjan, “Image Encryption for Mobile Devices,” in 2010 INTERNATIONAL CONFERENCE ON COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES, 2010, pp. 612–616. [65]C.-C. Chang, M.-S. Hwang, and T.-S. Chen, “A New Encryption Algorithm for Image Cryptosystems,” J. Syst. Softw., vol. 58, no. 2, pp. 83–91, Sep. 2001. [66]G. Zhao, X. Yang, B. Zhou, and W. Wei, “RSA-Based Digital Image Encryption Algorithm in Wireless Sensor Networks,” in 2010 2nd International Conference on Signal Processing Systems, 2010, vol. 2, pp. V2-640-V2-643. [67]Z. Zhao and X. Zhang, “ECC-Based Image Encryption Using Code Computing,” in Proceedings of the 2012 International Conference on Communication, Electronics and Automation Engineering, Springer, Berlin, Heidelberg, 2013, pp. 859–865. [68]L. Li, A. A. Abd El-Latif, and X. Niu, “Elliptic Curve ElGamal Based Homomorphic Image Encryption Scheme for Sharing Secret Images,” Signal Process., vol. 92, no. 4, pp. 1069–1078, Apr. 2012. [69]Y. Wang, K.-W. Wong, X. Liao, and G. Chen, “A New Chaos-Based Fast Image Encryption Algorithm,” Appl. Soft Comput., vol. 11, no. 1, pp. 514–522, Jan. 2011. [70]S. M. Seyedzadeh and S. Mirzakuchaki, “A Fast Color Image Encryption Algorithm Based on Coupled Two-Dimensional Piecewise Chaotic Map,” Signal Process., vol. 92, no. 5, pp. 1202–1215, May 2012. [71]M. François, T. Grosges, D. Barchiesi, and R. Erra, “A New Image Encryption Scheme Based on a Chaotic Function,” Signal Process. Image Commun., vol. 27, no. 3, pp. 249–259, Mar. 2012. [72]G. Chen, Y. Mao, and C. K. Chui, “A Symmetric Image Encryption Scheme Based on 3D Chaotic Cat Maps,” Chaos Solitons Fractals, vol. 21, no. 3, pp. 749–761, Jul. 2004. [73]C.-C. Chang, Q. Mao, and H.-L. Wu, “A Novel Authentication Scheme Based on Torus Automorphism for Smart Card,” in Advances in Intelligent Systems and Applications - Volume 2, Springer, Berlin, Heidelberg, 2013, pp. 53–60. [74]R. Devaney and R. L. Devaney, An Introduction to Chaotic Dynamical Systems, 2 edition. Boulder, Colo: CRC Press, 2003. [75]A. Shamir, “How to Share a Secret,” Commun ACM, vol. 22, no. 11, pp. 612–613, Nov. 1979. [76]P. Akritas, I. E. Antoniou, and G. P. Pronko, “On the Torus Automorphisms: Analytic solution, Computability and Quantization,” Chaos Solitons Fractals, vol. 12, no. 14, pp. 2805–2814, Nov. 2001. [77]I. Percival and F. Vivaldi, “Arithmetical Properties of Strongly Chaotic Motions,” Phys. Nonlinear Phenom., vol. 25, no. 1, pp. 105–130, Mar. 1987. [78]Q. Mao, C.-C. Chang, and H.-L. Wu, “An Image Encryption Scheme Based on Concatenated Torus Automorphisms,” KSII Trans. Internet Inf. Syst., vol. 7, no. 6, pp. 1492–1511, Jun. 2013.
|