{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,28]],"date-time":"2023-10-28T14:01:43Z","timestamp":1698501703764},"reference-count":33,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2009,8,1]],"date-time":"2009-08-01T00:00:00Z","timestamp":1249084800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Multimedia"],"published-print":{"date-parts":[[2009,8]]},"DOI":"10.1109\/tmm.2009.2021790","type":"journal-article","created":{"date-parts":[[2009,6,2]],"date-time":"2009-06-02T20:29:47Z","timestamp":1243974587000},"page":"947-959","source":"Crossref","is-referenced-by-count":28,"title":["An Efficient Authentication Scheme for Access Control in Mobile Pay-TV Systems"],"prefix":"10.1109","volume":"11","author":[{"family":"Hung-Min Sun","sequence":"first","affiliation":[]},{"family":"Muh-Chyi Leu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2008.917417"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2002.801466"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2008.2001381"},{"key":"ref30","author":"stinson","year":"2006","journal-title":"Cryptography Theory and Practice"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/DFMA.2005.17"},{"key":"ref11","year":"2004","journal-title":"Head-End Implementation of DVB Simulcrypt ETSI Standard"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2004.834861"},{"key":"ref13","year":"2005","journal-title":"IP Datacast over DVB-H Service Purchase and Protection (SPP)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISDA.2006.253764"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1007\/10722028_23","article-title":"a one round protocol for tripartite diffie-hellman","volume":"1838","author":"joux","year":"2000","journal-title":"Proc Algorithmic Number Theory Symp (ANTS-IV)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2004.1269719"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/30.826376"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CISW.2007.4425569"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/5.387094"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2003.1209533"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(99)80008-X"},{"key":"ref27","first-page":"47","article-title":"identity-based cryptosystem and signature scheme","author":"shamir","year":"1984","journal-title":"Proc CRYPTO 84"},{"key":"ref3","first-page":"213","article-title":"identity-based encryption from the weil pairing","author":"boneh","year":"2001","journal-title":"Proc Advances in Cryptology-Crypto"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/30.44305"},{"key":"ref29","author":"stallings","year":"2003","journal-title":"Cryptography and Network Security"},{"key":"ref5","year":"1992","journal-title":"Conditional-Access Broadcasting Systems"},{"key":"ref8","year":"1995"},{"key":"ref7","year":"2003","journal-title":"DVB Documents"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/69.790835"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.861011"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TBC.2007.891706"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-3198-2"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICON.2007.4444064"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/18.259647"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ITNW.1999.814351"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2006.262487"},{"key":"ref26","author":"scott","year":"2006","journal-title":"Implementing Cryptographic Pairings on Smartcards"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1049\/el:20020387"}],"container-title":["IEEE Transactions on Multimedia"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6046\/5166527\/05033651.pdf?arnumber=5033651","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T23:51:45Z","timestamp":1633909905000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5033651\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,8]]},"references-count":33,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tmm.2009.2021790","relation":{},"ISSN":["1520-9210","1941-0077"],"issn-type":[{"value":"1520-9210","type":"print"},{"value":"1941-0077","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,8]]}}}