[1]
|
H. S. L. Pequeno, G. A. M. Gomes, R. M. C. Andrade, J. N. de Souza and M. F. de Castro, “FrameIDTV: A Framework for Developing Interactive Applications on Digital Television Environments,” Journal of Network and Computer Applications, Vol. 33, No. 4, 2010, pp. 503-511.
|
[2]
|
H.-M. Sun and M.-C. Leu, “An Efficient Authentication Scheme for Access Control in Mobile Pay-TV Systems,” IEEE Transactions on Multimedia, Vol. 11, No. 5, 2009, pp. 947-959.
http://dx.doi.org/10. 1109/TMM. 2009.2021790
|
[3]
|
X. Li, J. Niu, M. Khurram Khan and J. Liao, “An Enhanced Smart Card Based Remote User Password Authentication Scheme,” Journal of Network and Computer Applications, Vol. 36, No. 5, 2013, pp. 1365-1371.
|
[4]
|
X. Li, Y. Xiong, J. Ma and W. Wang, “An Efficient and Security Dynamic Identity Based Authentication Protocol for Multi-Server Architecture Using Smart Cards,” Journal of Network and Computer Applications, Vol. 35, No. 2, 2012, pp. 763-769.
|
[5]
|
Z. Tan, “A Lightweight Conditional Privacy-Preserving Authentication and Access Control Scheme for Pervasive Computing Environments,” Journal of Network and Computer Applications, Vol. 35, No. 6, 2012, pp. 1839-1846.
|
[6]
|
N.-Y. Lee, C.-C. Chang, C.-L. Lin and T. Hwang, “Privacy and Non-Repudiation on Pay-TV Systems,” IEEE Transactions on Consumer Electronics, Vol. 46, No. 1, 2000, pp. 20-27. http://dx.doi.org/ 10.1109/30. 826376
|
[7]
|
R. Song and L. Korba, “Pay-TV System with Strong Privacy and Non-Repudiation Protection,” IEEE Transactions on Consumer Electronics, Vol. 49, No. 2, 2003, pp. 408-413. http://dx.doi.org/10.1109/ TCE.2003.1209533
|
[8]
|
S. F. Yeung, J. C. Lui and D. K. Yau, “A Multikey Secure Multimedia Proxy Using Asymmetric Reversible Parametric Sequences: Theory, Design and Implementation,” IEEE Transactions on Multimedia, Vol. 7, No. 2, 2005, pp. 330-338.
http://dx.doi.org/10.1109/TMM.2005.843361
|
[9]
|
H. Roh and S. Jung, “An Authentication Scheme for Consumer Electronic Devices Accessing Mobile IPTV Service From Home Networks,” 2011 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, 9-12 January 2011, pp. 717-718.
|
[10]
|
Y.-L. Huang, S. Shieh, F.-S. Ho and J.-C. Wang, “Efficient Key Distribution Schemes for Secure Media Delivery in Pay-TV Systems,” IEEE Transactions on Multimedia, Vol. 6, No. 5, 2004, pp. 760-769.
http://dx.doi.org/10.1109/TMM.2004.834861
|
[11]
|
H.-M. Sun, C.-M. Chen and C.-Z. Shieh, “Flexible-Payper-Channel: A New Model for Content Access Control in Pay-TV Broadcasting Systems,” IEEE Transactions on Multimedia, Vol. 10, No. 5, 2008, pp. 1109-1120.
http://dx.doi.org/10.1109/TMM.2008.2001381
|
[12]
|
R. Di Pietro and R. Molva, “An Optimal Probabilistic Solution for Information Confinement, Privacy, and Security in RFID Systems,” Journal of Network and Computer Applications, Vol. 34, No. 3, 2011, pp. 853-863.
|
[13]
|
W. I. Khedr, “SRFID: A Hash-Based Security Scheme for Low Cost RFID Systems,” Egyptian Informatics Journal, Vol. 14, No. 1, 2013, pp. 89-98.
|
[14]
|
T.-H. Chen, Y.-C. Chen, W.-K. Shih and H.-W. Wei, “An Efficient Anonymous Authentication Protocol for Mobile Pay-TV,” Journal of Network and Computer Applications, Vol. 34, No. 4, 2011, pp. 1131-1137.
|
[15]
|
J.-H. Yang and C.-C. Chang, “An ID-Based Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices on Elliptic Curve Cryptosystem,” Computers & Security, Vol. 28, No. 3-4, 2009, pp. 138-143.
http://dx.doi.org/10.1016/j.cose.2008.11.008
|
[16]
|
WMF-T33-107-R020v02, “Architecture, detailed Protocols and Procedures,” 2012.
|
[17]
|
OpenSSL, “OpenSSL 1.0.1e,” 2013.
|