One-to-many authentication for access control in mobile pay-TV systems

Article Properties
Cite
He, Debiao, et al. “One-to-Many Authentication for Access Control in Mobile Pay-TV Systems”. Science China Information Sciences, vol. 59, no. 5, 2016, https://doi.org/10.1007/s11432-015-5469-5.
He, D., Kumar, N., Shen, H., & Lee, J.-H. (2016). One-to-many authentication for access control in mobile pay-TV systems. Science China Information Sciences, 59(5). https://doi.org/10.1007/s11432-015-5469-5
He, Debiao, Neeraj Kumar, Han Shen, and Jong-Hyouk Lee. “One-to-Many Authentication for Access Control in Mobile Pay-TV Systems”. Science China Information Sciences 59, no. 5 (2016). https://doi.org/10.1007/s11432-015-5469-5.
He D, Kumar N, Shen H, Lee JH. One-to-many authentication for access control in mobile pay-TV systems. Science China Information Sciences. 2016;59(5).
Journal Categories
Science
Mathematics
Instruments and machines
Electronic computers
Computer science
Science
Mathematics
Instruments and machines
Electronic computers
Computer science
Computer software
Science
Science (General)
Cybernetics
Information theory
Technology
Electrical engineering
Electronics
Nuclear engineering
Electric apparatus and materials
Electric circuits
Electric networks
Technology
Electrical engineering
Electronics
Nuclear engineering
Electronics
Computer engineering
Computer hardware
Refrences
Title Journal Journal Categories Citations Publication Date
A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks Information Sciences
  • Technology: Technology (General): Industrial engineering. Management engineering: Information technology
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Telecommunication
  • Science: Science (General): Cybernetics: Information theory
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
178 2015
10.1109/MCOM.2015.7010518 2015
Cryptanalysis and Improvement of an Anonymous Authentication Protocol for Wireless Access Networks Wireless Personal Communications
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Telecommunication
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Telecommunication
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
50 2014
Improved one-to-many authentication scheme for access control in pay-TV systems IET Information Security
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics: Computer engineering. Computer hardware
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
  • Science: Science (General): Cybernetics: Information theory
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science: Computer software
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics: Computer engineering. Computer hardware
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
18 2012
10.1109/TBC.2009.2036956 IEEE Transactions on Broadcasting
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electric apparatus and materials. Electric circuits. Electric networks
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Telecommunication
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Telecommunication
  • Technology: Technology (General): Industrial engineering. Management engineering: Information technology
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Telecommunication
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
2011
Citations
Title Journal Journal Categories Citations Publication Date
Comparative Analysis of Handover Authentication Techniques in VANETs Wireless Personal Communications
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Telecommunication
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Telecommunication
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
2023
Toward data privacy preservation with ciphertext update and key rotation for IoT

Concurrency and Computation: Practice and Experience
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science: Computer software
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science: Computer software
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics: Computer engineering. Computer hardware
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
20 2021
Non-Interactive and Secure Data Aggregation Scheme for Internet of Things

Electronics
  • Science: Science (General): Cybernetics: Information theory
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electric apparatus and materials. Electric circuits. Electric networks
  • Science: Physics
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics
  • Technology: Engineering (General). Civil engineering (General)
2 2021
A Computationally Efficient and Scalable Key Management Scheme for Access Control of Media Delivery in Digital Pay-TV Systems Multimedia Tools and Applications
  • Science: Science (General): Cybernetics: Information theory
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science: Computer software
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electric apparatus and materials. Electric circuits. Electric networks
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science: Computer software
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics: Computer engineering. Computer hardware
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
47 2020
Secure mutual authentication with privacy preservation in vehicular ad hoc networks Vehicular Communications
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Telecommunication
  • Technology: Engineering (General). Civil engineering (General): Transportation engineering
  • Technology: Technology (General): Industrial engineering. Management engineering: Information technology
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Telecommunication
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
17 2020
Citations Analysis
Category Category Repetition
Science: Mathematics: Instruments and machines: Electronic computers. Computer science33
Technology: Electrical engineering. Electronics. Nuclear engineering: Telecommunication21
Technology: Electrical engineering. Electronics. Nuclear engineering: Electric apparatus and materials. Electric circuits. Electric networks16
Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics: Computer engineering. Computer hardware15
Science: Science (General): Cybernetics: Information theory14
Science: Mathematics: Instruments and machines: Electronic computers. Computer science: Computer software14
Technology: Technology (General): Industrial engineering. Management engineering: Information technology9
Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics8
Medicine: Medicine (General): Medical technology6
Medicine: Medicine (General): Computer applications to medicine. Medical informatics6
Medicine: Medicine (General)6
Technology: Engineering (General). Civil engineering (General)5
Technology: Mechanical engineering and machinery4
Technology: Electrical engineering. Electronics. Nuclear engineering2
Technology: Engineering (General). Civil engineering (General): Transportation engineering2
Science: Mathematics2
Technology: Chemical technology1
Science: Chemistry: Analytical chemistry1
Science: Mathematics: Instruments and machines1
Science: Chemistry1
Science: Physics1
Technology: Technology (General): Industrial engineering. Management engineering: Applied mathematics. Quantitative methods1
Science: Science (General)1
The category Science: Mathematics: Instruments and machines: Electronic computers. Computer science 33 is the most commonly referenced area in studies that cite this article. The first research to cite this article was titled A robust ElGamal‐based password‐authentication protocol using smart card for client‐server communication and was published in 2016. The most recent citation comes from a 2023 study titled Comparative Analysis of Handover Authentication Techniques in VANETs. This article reached its peak citation in 2016, with 22 citations. It has been cited in 26 different journals, 15% of which are open access. Among related journals, the Wireless Personal Communications cited this research the most, with 6 citations. The chart below illustrates the annual citation trends for this article.
Citations used this article by year