Computer Applications for Security, Control and System Engineering

This book constitutes the refereed proceedings of the International Conferences on Security Technology, SecTech 2012, on Control and Automation, CA 2012, and CES-CUBE 2012, the International Conference on Circuits, Control, Communication, Electricity, Electronics, Energy, System, Signal and Simulation; all held in conjunction with GST 2012 on Jeju Island, Korea, in November/December 2012. The papers presented were carefully reviewed and selected from numerous submissions and focus on the various aspects of security technology, and control and automation, and circuits, control, communication, electricity, electronics, energy, system, signal and simulation.

[1]  Chin-Chen Chang,et al.  An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem , 2009, Comput. Secur..

[2]  Hung-Min Sun,et al.  An Efficient Authentication Scheme for Access Control in Mobile Pay-TV Systems , 2009, IEEE Transactions on Multimedia.

[3]  Allan Tomlinson,et al.  Conditional access in mobile systems: securing the application , 2005, First International Conference on Distributed Frameworks for Multimedia Applications.

[4]  John Cosmas,et al.  A Cooperative Cellular and Broadcast Conditional Access System for Pay-TV Systems , 2010, IEEE Transactions on Broadcasting.

[5]  Wei-Kuan Shih,et al.  An efficient anonymous authentication protocol for mobile pay-TV , 2011, J. Netw. Comput. Appl..

[6]  Ronggong Song,et al.  Pay-TV system with strong privacy and non-repudiation protection , 2003, IEEE Trans. Consumer Electron..

[7]  Gerard Faria,et al.  DVB-H: Digital Broadcast Services to Handheld Devices , 2006, Proceedings of the IEEE.

[8]  William Stallings,et al.  Cryptography and network security , 1998 .

[9]  Chun-Li Lin,et al.  Privacy and non-repudiation on pay-TV systems , 2000, IEEE Trans. Consumer Electron..