1 |
J. Zhou and Y. Ou, "Key tree and Chinese remainder theorem based group key distribution scheme," Journal of Chinese Institute of Engineers, Transactions of the Chinese Institute of Engineers, Series A/Chungk-kuoKung Ch'eng Hsuck K'an Vol.32, Issue7, pp.967-974, 2009.
|
2 |
Y. Ren, V. Oleshchuk and F. Li, "An efficient Chinese remainder theorem based node capture resilience scheme for Mobile WSNs," IEEE International Conference on Information Theory and Information Security (ICITIS), pp.689-692, 2010.
|
3 |
Y. Song and Y. Zhang, "A mixed key management scheme of clustering wireless sensor network," International Conference on Computer Application and System Modeling (ICCASM), pp.v7198-v7201, 2010.
|
4 |
EBU Project Group B/CA, "Functional model of a conditional access system", EBU Technical Review, pp.64-77, 1995.
|
5 |
W. Kanjanarin and T. Amornraksa, "Scrambling and key distribution scheme for digital television", IEEE International Conference on Networks (ICN), pp.140-145, 2001.
|
6 |
T. Jiang, Y. Hou and S. Zheng, "Secure communication between set-top box and smart card in DTV broadcasting", IEEE Transaction on Consumer Electronics, Vol.50, No.3, pp.882-886, 2004.
DOI
ScienceOn
|
7 |
S. Lee, N. Park, S. Kim and J. Choi, "Cryptanalysis of secure key exchange protocol between STB and smart card in IPTV broadcasting", International Conference on Information Security and Assurance (ISA), LNCS 5576, pp.797-803, 2009.
|
8 |
T. Hou, J. Lai and C. Yeh, "Based on cryptosystem secure communication between set-top box and smart card in DTV broadcasting", TENCON 2007, IEEE Region 10 Conference, pp.1-5, 2007.
|
9 |
H. Kim, "Secure communication in digital TV broadcasting", International Journal of Computer Science and Network Security (IJCSNS), Vol.8, No.9, pp.1-5, 2008.
|
10 |
E. Yoon and K. Yoo, "Robust key exchange protocol between set-top box and smart card in DTV broadcasting", INFORMATICA, Vol.20, No.1, pp.139-150, 2009.
|
11 |
T. Comen, C. Leiserson, R. Rivest and C. Stein, "Introduction to algorithms," Second Edition. MIT Press and Mcgraw-Hill, 2001. ISBN 09262-03293-7.
|
12 |
G. Chiou and W. Chen, "Secure broadcasting using the secure lock," IEEE Transaction on Software Engineering, Vol.15, No.8, pp.929-934, 1989
DOI
ScienceOn
|
13 |
B. Hu, W. Ye, S. Feng and X. Wang, "Key distribution scheme based on two cryptosystems for hierarchical access control," IEEE International Conference on Advanced Communication Technology (ICACT), pp.1723-1728, 2006.
|
14 |
X. Zheng, C. Huang and M. Matthews, "Chinese remainder theorem based group key management," ACM Southeast Regional Conference, pp.206-271, 2007.
|