2008
DOI: 10.1109/tce.2008.4637612
|View full text |Cite
|
Sign up to set email alerts
|

A novel protocol for downloadable CAS

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
21
0

Year Published

2009
2009
2017
2017

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 15 publications
(21 citation statements)
references
References 8 publications
0
21
0
Order By: Relevance
“…• To prevent the replay attack or the man-in-the-middle attack, DCAS protocol is required mutual authentication between a secure chip (SC) in STB and a DCAS headend(DH) based on random challenges and trusted signatures [1].…”
Section: Requirementsmentioning
confidence: 99%
See 4 more Smart Citations
“…• To prevent the replay attack or the man-in-the-middle attack, DCAS protocol is required mutual authentication between a secure chip (SC) in STB and a DCAS headend(DH) based on random challenges and trusted signatures [1].…”
Section: Requirementsmentioning
confidence: 99%
“…When users moved to another residence, they not only had to change the local broadcaster but also replace the existing STB with new one. Therefore, a hardware-based CAS module was developed for updating of the CAS module instead of replacing the STB, and it could be removable [1]. However, this approach also has few drawbacks.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations