1 |
A. Sahai and B. Waters, "Fuzzy identity based encryption," Proceeding of Eurocrypt'05, 2005.
|
2 |
E.J. Yoon and Y. Yoo, "Improving the Dynamic IDBased Remote Mutual Authentication Scheme," Proceeding of OTM Workshop 2006, LNCS 4277, 2006, pp. 499-507.
|
3 |
K. Frikken, M. Atallah, and J. Li, "Attribute-Based Access Control with Hidden Policies and Hidden Credentials," IEEE Transaction on Computers, vol.55(10),2006, pp. 1259-1270.
DOI
ScienceOn
|
4 |
M. Pirretti, P. Traynor, and B. Waters, "Attribute-Based Systems," Proceeding of CCS 2006, 2006.
|
5 |
T. Jiang, Y. Hou, and S. Zheng, "Secure Communication between set-top-box and smart card in DTV broadcasting," IEEE Transactions on Consumer Electronics, vol.50(3), 2004, pp. 882-886.
DOI
ScienceOn
|
6 |
http://www.itu.int/ITU-T/IPTV/
|
7 |
R.S. Pippal, S. Tapaswi, and L. Li, "Secure Key Exchange Scheme for IPTV Broadcasting," Informatica, vol.36(1), 2012, pp. 47-52.
|
8 |
M.L. Das, A. Saxena, and V.P. Gulate, "A dynamic ID-based remote user authentication scheme," IEEE Transaction on Information Theory, vol.6(11), 2004, pp. 629-631.
|
9 |
W. Diffie and M.E. Hellman, "New Directions in Cryptography," IEEE Transaction on Information Theory, vol.6(11), 1976, pp. 644-654.
|
10 |
M.S. Hwang and L.H. Li, "A new remote user authentication scheme using smart cards," IEEE Transaction on Consumer Electronics, vol.46(1), 2000, pp. 28-30.
DOI
ScienceOn
|
11 |
H.Y. Chien and C.H. Chen, "A Remote Authentication Scheme Preserving User Anonymity," Proceeding of 19th International Conference on Advanced Information Networking and Applications, 2005.
|