Key Distribution Scheme for Supporting Multiple Set-Top Box in Chipset Pairing Conditional Access System

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Face Recognition System for Set-Top Box-Based Intelligent TV

Despite the prevalence of smart TVs, many consumers continue to use conventional TVs with supplementary set-top boxes (STBs) because of the high cost of smart TVs. However, because the processing power of a STB is quite low, the smart TV functionalities that can be implemented in a STB are very limited. Because of this, negligible research has been conducted regarding face recognition for conve...

متن کامل

SOC Design for IPTV Set Top Box

IPTV is mainly used for Live Streaming, Time Shifting and provide Videos on Demand (VOD). In recent years of development in System on Chip (SOC) design the Ethernet transmission capability is 100Mbps.The data transmitted is in the form of packets through the Ethernet cable. This packet has to be converted into frames and stored in the memory. Generally, processor accesses the memory and stores ...

متن کامل

An Efficient Key Pre - distribution Scheme for Multiple Attacks

Probabilistic Key pre-distribution schemes (P-KPSs) are candidates for securing interactions between resource limited computer networks. Collusion susceptible P-KPSs are trade-offs between security and complexity and security include resistance to passive eavesdropping attacks, and active message injection attacks. The existing work presented the P-KPS, the subset keys and identity tickets (SKI...

متن کامل

An Efficient Scheme for Multiple Access in a RFID System

In this paper, we present an anti-collision scheme in a RFID system. The scheme is based on dynamic framed ALOHA protocol developed for radio networks. In our scheme, we propose a method to estimate the number of tags and derive the optimal frame length. Simulation results indicate that the error of our tag estimate method can be less than 1%. The total number of time slots for reading all tags...

متن کامل

Broadcast Encryption Scheme and Its Implementation on Conditional Access System

Broadcast encryption schemes are suitable for one-way content distribution and protection applications. In this paper, we give a concrete implementation framework for how to introduce BE schemes into Conditional Access Systems(CAS). And then we compare the transmission performance of four highly efficient broadcast encryption schemes with traditional CAS system. Based on these experimental resu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The KIPS Transactions:PartC

سال: 2012

ISSN: 1598-2858

DOI: 10.3745/kipstc.2012.19c.1.039