2000
DOI: 10.1109/30.826376
|View full text |Cite
|
Sign up to set email alerts
|

Privacy and non-repudiation on pay-TV systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
2
0

Year Published

2012
2012
2017
2017

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(3 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…These methods suffer the heavy computation burden. In [6], a subscriber first has to register his subscriber information with a signature to a provider by applying public key cryptosystem. When a subscriber wants to subscribe to any programs, he uses his device to send a subscription message to the provider.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…These methods suffer the heavy computation burden. In [6], a subscriber first has to register his subscriber information with a signature to a provider by applying public key cryptosystem. When a subscriber wants to subscribe to any programs, he uses his device to send a subscription message to the provider.…”
Section: Introductionmentioning
confidence: 99%
“…The provider then sends a receipt with a signature for confirming this subscription to the subscriber. However, the scheme [6] only protects the customers' privacy, but not the provider's [2]. In [7], an "e-ticket" scheme for the authentication of pay-TV system is proposed.…”
Section: Introductionmentioning
confidence: 99%
“…With the number of digital TV subscribers increasing rapidly, the efficiency of authentication and key establishment become a key factor that affects the performance, but traditional CAS did not consider the efficiency of authentication in interactive mode [3] . In addition, the subscriber management system (SMS) manages a large number of identity's information, so the privacy protection has become a basic demand [4] , especially in the use of many triple play services such as home networking, home security, family health, etc. This will inevitably reflect their own information.…”
Section: Introductionmentioning
confidence: 99%