{"id":"https://openalex.org/W2151163566","doi":"https://doi.org/10.1109/tmm.2009.2021790","title":"An Efficient Authentication Scheme for Access Control in Mobile Pay-TV Systems","display_name":"An Efficient Authentication Scheme for Access Control in Mobile Pay-TV Systems","publication_year":2009,"publication_date":"2009-06-02","ids":{"openalex":"https://openalex.org/W2151163566","doi":"https://doi.org/10.1109/tmm.2009.2021790","mag":"2151163566"},"language":"en","primary_location":{"id":"doi:10.1109/tmm.2009.2021790","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmm.2009.2021790","pdf_url":null,"source":{"id":"https://openalex.org/S137030581","display_name":"IEEE Transactions on Multimedia","issn_l":"1520-9210","issn":["1520-9210","1941-0077"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Multimedia","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076813053","display_name":"Hung\u2013Min Sun","orcid":"https://orcid.org/0000-0003-0870-9973"},"institutions":[{"id":"https://openalex.org/I25846049","display_name":"National Tsing Hua University","ror":"https://ror.org/00zdnkx70","country_code":"TW","type":"education","lineage":["https://openalex.org/I25846049"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Hung-Min Sun","raw_affiliation_strings":["Department of Computer Science, National Tsing Hua University, Hsinchu, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, National Tsing Hua University, Hsinchu, Taiwan","institution_ids":["https://openalex.org/I25846049"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083534024","display_name":"Muh-Chyi Leu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210148468","display_name":"Industrial Technology Research Institute","ror":"https://ror.org/05szzwt63","country_code":"TW","type":"nonprofit","lineage":["https://openalex.org/I4210148468"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Muh-Chyi Leu","raw_affiliation_strings":["Industrial Technology and Research Institute, Hsinchu, Taiwan"],"affiliations":[{"raw_affiliation_string":"Industrial Technology and Research Institute, Hsinchu, Taiwan","institution_ids":["https://openalex.org/I4210148468"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5076813053"],"corresponding_institution_ids":["https://openalex.org/I25846049"],"apc_list":null,"apc_paid":null,"fwci":3.4895,"has_fulltext":false,"cited_by_count":31,"citation_normalized_percentile":{"value":0.93172962,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"11","issue":"5","first_page":"947","last_page":"959"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8293906450271606},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6685007810592651},{"id":"https://openalex.org/keywords/authentication-server","display_name":"Authentication server","score":0.6582690477371216},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6345694065093994},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6294730305671692},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.5565603375434875},{"id":"https://openalex.org/keywords/mutual-authentication","display_name":"Mutual authentication","score":0.5520595908164978},{"id":"https://openalex.org/keywords/data-authentication-algorithm","display_name":"Data Authentication Algorithm","score":0.5280875563621521},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.4872840642929077},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4833666682243347},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.4475928246974945},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.42006051540374756}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8293906450271606},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6685007810592651},{"id":"https://openalex.org/C2777331311","wikidata":"https://www.wikidata.org/wiki/Q784561","display_name":"Authentication server","level":3,"score":0.6582690477371216},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6345694065093994},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6294730305671692},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.5565603375434875},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.5520595908164978},{"id":"https://openalex.org/C168970074","wikidata":"https://www.wikidata.org/wiki/Q5227146","display_name":"Data Authentication Algorithm","level":4,"score":0.5280875563621521},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4872840642929077},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4833666682243347},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.4475928246974945},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.42006051540374756},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tmm.2009.2021790","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmm.2009.2021790","pdf_url":null,"source":{"id":"https://openalex.org/S137030581","display_name":"IEEE Transactions on Multimedia","issn_l":"1520-9210","issn":["1520-9210","1941-0077"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Multimedia","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6499999761581421,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W142045744","https://openalex.org/W329998640","https://openalex.org/W1515956306","https://openalex.org/W1532836984","https://openalex.org/W1569083856","https://openalex.org/W1582741554","https://openalex.org/W1950812296","https://openalex.org/W1964304483","https://openalex.org/W1966453127","https://openalex.org/W2002023175","https://openalex.org/W2029022966","https://openalex.org/W2079416813","https://openalex.org/W2090911915","https://openalex.org/W2098996144","https://openalex.org/W2100794332","https://openalex.org/W2107823667","https://openalex.org/W2111310412","https://openalex.org/W2117420234","https://openalex.org/W2125955667","https://openalex.org/W2128718974","https://openalex.org/W2129289579","https://openalex.org/W2135010923","https://openalex.org/W2136588110","https://openalex.org/W2138122725","https://openalex.org/W2147181464","https://openalex.org/W2152924492","https://openalex.org/W2168475087","https://openalex.org/W2168555666","https://openalex.org/W2172268792","https://openalex.org/W4210419940","https://openalex.org/W4250327184","https://openalex.org/W6671828919"],"related_works":["https://openalex.org/W2482813613","https://openalex.org/W2017959161","https://openalex.org/W2399882206","https://openalex.org/W2129970007","https://openalex.org/W2405671815","https://openalex.org/W2364053809","https://openalex.org/W2193060290","https://openalex.org/W1968284308","https://openalex.org/W2116285675","https://openalex.org/W4220710588"],"abstract_inverted_index":{"In":[0,16,112],"a":[1,5,31,43,169,193,248],"mobile":[2,81,110,284],"pay-TV":[3,82,285],"system,":[4],"large":[6,44],"number":[7],"of":[8,42,46,68,147,161,172,201,243,276],"messages":[9,47],"are":[10,98,106],"exchanged":[11],"for":[12,63,109,131,164,223,283],"mutual":[13],"authentication":[14,18,24,119,129,195,222],"purposes.":[15],"traditional":[17,57,90,187,234],"schemes,":[19],"with":[20],"one-to-one":[21],"delivery,":[22],"one":[23,128],"message":[25,130],"per":[26],"request":[27],"is":[28,50,83,134,211,280],"delivered":[29],"from":[30,72,136],"head":[32,138],"end":[33,139],"system":[34,140],"to":[35,77,85,141,197,214,219,254],"subscribers.":[36,142],"This":[37,174],"results":[38],"in":[39,121,158,168],"the":[40,137,159,165,199,209,227,244,257,266],"delivery":[41],"quantity":[45],"and":[48,52,66,149,181,265],"therefore":[49],"inefficient":[51],"costly.":[53],"Moreover,":[54,218],"since":[55],"most":[56],"schemes":[58,91,235],"use":[59],"an":[60,117,230],"RSA-based":[61],"signature":[62],"identity":[64,225],"validation":[65],"nonrepudiation":[67],"communication,":[69],"they":[70,97,105],"suffer":[71],"high":[73],"communication":[74,184],"costs.":[75],"Due":[76],"its":[78],"wireless":[79],"nature,":[80],"vulnerable":[84],"attacks":[86,205],"during":[87,100,206],"hand-off.":[88,101],"As":[89],"do":[92,236],"not":[93,107,237,252,262],"support":[94,215],"hand-off":[95,194],"authentication,":[96],"insecure":[99],"With":[102,273],"these":[103,274],"shortcomings,":[104],"suitable":[108],"pay-TV.":[111],"this":[113,190],"paper,":[114],"we":[115],"propose":[116],"innovative":[118],"scheme,":[120,278],"which,":[122],"by":[123],"providing":[124],"one-to-many":[125,156],"facility,":[126],"only":[127],"multiple":[132,162],"requests":[133,163],"broadcasted":[135],"By":[143],"employing":[144],"bilinear":[145],"property":[146],"pairing":[148],"elliptic":[150],"curve":[151],"cryptography,":[152],"our":[153,277],"scheme":[154,176,191,210,228,232,240,246],"provides":[155,192],"facility":[157],"case":[160],"same":[166],"service":[167],"short":[170],"period":[171],"time.":[173],"new":[175],"achieves":[177],"better":[178],"broadcast":[179],"efficiency":[180],"performance":[182],"on":[183],"costs":[185],"than":[186],"ones.":[188],"Additionally,":[189],"mechanism":[196,260],"protect":[198],"access":[200,216],"services":[202],"while":[203,233],"preventing":[204],"hand-off;":[207],"therefore,":[208],"more":[212],"secure":[213],"control.":[217],"provide":[220],"anonymous":[221],"protecting":[224],"privacy,":[226],"adopts":[229],"identity-based":[231,245],"apply.":[238],"The":[239],"inherits":[241],"advantages":[242,275],"that":[247],"public":[249],"key":[250,267],"does":[251],"need":[253],"be":[255,263,271],"certificated,":[256],"certification":[258],"authority":[259],"will":[261],"needed":[264],"exchange":[268],"overhead":[269],"can":[270],"reduced.":[272],"it":[279],"well":[281],"suited":[282],"system.":[286]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":8},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":7}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
