首页--工业技术论文--自动化技术、计算机技术论文--计算技术、计算机技术论文--一般性问题论文--安全保密论文

Embedded Secure Control Access for Pay-TV

DEDICATION第5-6页
Abstract第6-7页
摘要第8-10页
TABLE OF CONTENTS第10-13页
LIST OF FIGURES第13-14页
LIST OF TABLES第14-15页
CHAPTER 1:General Introduction第15-24页
    1.1 Introduction第15-17页
    1.2 Problem Description第17-18页
    1.3 Novel Attacks and Countermeasures第18-21页
        1.3.1 Physical Access第18页
        1.3.2 Internet Attacks第18页
        1.3.3 Attacks on Automobiles第18-19页
        1.3.4 Battery Attack第19页
        1.3.5 Quality of Service Attacks第19-20页
        1.3.6 Attacks on Sensor networks第20页
        1.3.7 Power Attack第20-21页
    1.4 Motivation第21-22页
    1.5 Thesis Overview第22页
    1.6 Conclusion第22-24页
CHAPTER 2:Background Information and Preview Research第24-49页
    2.1 Introduction第24页
    2.2 Purpose of Cryptography第24-25页
    2.3 Types of Cryptographic Algorithms第25-28页
        2.3.1 Secret Key Cryptography第26页
        2.3.2 Public-Key Cryptography第26-27页
        2.3.3 Hash Functions第27-28页
    2.4 Communication Protocols and Cryptographic Algorithms in Action第28-37页
        2.4.1 IP Security(IPsec)Protocol第28-30页
        2.4.2 The SSL "Family" of Secure Transaction Protocols for the World Wide Web第30-31页
        2.4.3 DES Operational Overview第31-33页
        2.4.4 Breaking Data Encryption Standard(DES)第33-34页
        2.4.5 Advanced Encryption Standard(AES or Rijndael)Overview第34-37页
    2.5 Advanced Encryption Standard Algorithm Specification第37-44页
        2.5.1 Cipher第38-39页
        2.5.2 The SubBytes transformation第39-40页
        2.5.3 The ShiftRows transformation第40页
        2.5.4 The MixColumns transformation第40-41页
        2.5.5 AddRoundKey Transfomation第41页
        2.5.6 Expanded Key第41-43页
        2.5.7 Inverse Cipher第43-44页
    2.6 Previous Research on Embedded pay-TV Systems第44-46页
        2.6.1 High-Performance Rekeying Processor Architecture for Group Key Management第45页
        2.6.2 Security Architectures in Mobile Integrated pay-TV Control Access System第45-46页
    2.7 Contribution of Thesis第46-48页
    2.8 Conclusion第48-49页
CHAPTER 3:Embedded Secure Control Access for pay-TV第49-76页
    3.1 Control Access Secure System for pay-TV第49-50页
    3.2 Control Access Secure Scheme Overview第50-52页
        3.2.1 Control Access Authenrication Module(CAAM)第51-52页
        3.2.2 Control Access Secure Module(CASM)第52页
    3.3 Integrated Receiver Devices(IRD)Overview第52-55页
        3.3.1 Tuner/Demodulator第53页
        3.3.2 Converter第53-54页
        3.3.3 Descrambler第54页
        3.3.4 Cable Box(Combination Converter/Descrambler)第54页
        3.3.5 CASM第54页
        3.3.6 Demultiplexer/Decoder第54-55页
    3.4 Input/Output Units(I/O)第55-59页
        3.4.1 Framework Content Formats第55-57页
        3.4.2 Protocol Operation第57-58页
        3.4.3 CASS Instruction Set第58-59页
    3.5 Security Unit(SU)第59-62页
        3.5.1 Single Communication Protocol(SCP)第60-61页
        3.5.2 Random Authentication Request(RAR)第61-62页
    3.6 General Architecture第62-66页
        3.6.1 Hardware Architecture第63-64页
        3.6.2 Software Architecture第64-66页
    3.7 Scheme Implementation Details第66-67页
    3.8 Generic Architecture of an Embedded Linux System第67-69页
    3.9 Design Methodology第69-72页
        3.9.1 Creating a Target Linux System第69页
        3.9.2 Setting Up and Using Development Tools第69-71页
        3.9.3 Developing for the Embedded第71页
        3.9.4 Networking第71-72页
    3.10 Embedded Systems Design Flows第72-75页
    3.11 Conclusion第75-76页
CHAPTER 4:Experiments第76-89页
    4.1 Experimental Setup第76-81页
        4.1.1 Host IPAddress configuration第77页
        4.1.2 Copy Client file in the GM 8120 board第77-78页
        4.1.3 Host and target communication through Access Point第78-81页
    4.2 Experimental Methodology第81-85页
    4.3 Experimental Results第85-88页
        4.3.1 Graphic interpretation第85-87页
        4.3.2 Performance measurements第87-88页
    4.4 Conclusion第88-89页
CONCLUSION AND FUTUR WORKS第89-91页
REFERENCES第91-97页
ACKNOWLEDGMENTS第97-98页
PUBLICATIONS第98-99页
APPENDIX第99-101页
    APPENDIX 1:Experiment environment setup & results in laboratory第99-100页
    APPENDIX 2:Server Code第100-101页
    APPENDIX 3:Client Code第101页

论文共101页,点击 下载论文
上一篇:Ultra Wide Band Multiple Access by Using DS-BPSK
下一篇:环境诉讼机制的反思与重塑--以环境民事诉讼为分析视角