Jiayin Tian
Communication University of China
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Jiayin Tian.
international conference on e-business engineering | 2012
Fangtian Hou; Cheng Yang; Jianbo Liu; Yichun Zhang; Jiayin Tian; Yakun Zhang
With the popularity of the mobile internet, the thin client terminals play an important role in our daily life. Because the thin client terminals have limited computation ability, the light-weight authentication scheme is a urgent problem to be solved. In this paper, we propose a novel mutual lightweight authentication protocol called HB-MAP. In the protocol the client just need store a small amount of messages and do some simple bit-wise operations, the computation-consuming operations such as the generation of random challenges are all done by the server. Finally we will also analysis the security vulnerabilities of HB-MAP protocol.
mobile adhoc and sensor systems | 2009
Cheng Yang; Jianbo Liu; Yichun Zhang; Jiayin Tian; Lei Yang
For interactive TV (ITV) services in converged network, the DVB-based DTV and the IP-based IPTV coexist in a single dual mode set-top box (STB) and the traditional one-way DVB-CA cannot be adapted to the variation. In this paper, a simplified and secure conditional access scheme based on the simplified double layer is proposed to realize authentication and access control between servers and STBs. In this scheme, the advanced encryption standard (AES) and the common scramble algorithm (CSA) are combined to secure the ITV service and its entitled control message. The video fingerprint and legitimate watermark is used for the piracy tracking and the conditional playing. The elliptic curve based authentication algorithm is used for secure authentication. Under the tripartite participation, the service key access protocol is designed to dynamically update the service keys. The algorithm in the front-end, the algorithm in the STB client and the service key access protocol are proposed in detail. Through the test in an actual application environment and the analysis of security, the proposed conditional access system is very secure with high performance for high definition ITV service and large scale customers.
Wuhan University Journal of Natural Sciences | 2013
Fangtian Hou; Cheng Yang; Jianbo Liu; Yichun Zhang; Jiayin Tian; Yakun Zhang
HB-MAP (HB-mutual authentication protocol) is a mutual ultra-light-weight authentication protocol we have proposed before. In this paper, we present an HB-MAP simulation model. This model is based on the OPNET modeler and includes three parts, namely, the network model, the node model, and the process model. The simulation results are obtained mainly in the aspects of running time, queuing delay, throughput, and channel utilization. To show the performance of HB-MAP, simulation of two other protocols HB and LCAP (load-based concurrent access protocol) is also executed, and comparative analysis is carried out on the results. At the end of the paper, we show a simple process of the attacks and identify that the HB-MAP can defend against some attacks.
international conference on internet technology and applications | 2011
Jiayin Tian; Cheng Yang; Yichun Zhang; Jianbo Liu
Seamless Video Service is a new service mode, providing video services to users at any time and any place. In seamless content delivery system, the authentication & authorization protocol is an essential problem to be solved. In this paper, an authentication & authorization protocol suitable for seamless video services with light weight certificate, namely SVSAAP is proposed. Through the analysis of the protocol on efficiency and security, the proposed scheme is effective and secure.
international symposium on intelligent information technology and security informatics | 2010
Jiayin Tian; Cheng Yang; Yichun Zhang; Jianbo Liu
In the Pay-TV system, the Key Management System (KMS) is one of the essential basis. The KMS is used to prevent the unauthorized access to the audio/video data and ensure the benefit of the service providers. The security of the KMS is primarily affected by the key distribution process. In this paper, a distributed key management scheme based on the notion of the rekey path method is proposed. Through the comparison of the proposed scheme and the traditional scheme which is based on the smart card, the proposed scheme is low cost and secure.
mobile adhoc and sensor systems | 2009
Yichun Zhang; Cheng Yang; Jianbo Liu; Jiayin Tian
In this paper, we propose a novel three party authentication scheme which could realize the mutual authentication among the involved parities (service provider, terminal and smart-card), and our scheme can be used for more fair-use oriented DRM scheme framework design. The scheme is highly efficient and secure, and it’s immune to many existing attacks. Keywords-mobile TV; DRM; smart-card; authentication
Archive | 2012
Cheng Yang; Jianbo Liu; Jiayin Tian; Yichun Zhang; Huan Wang; Meng Chen; Jiechao Chen
international conference on management of e-commerce and e-government | 2009
Cheng Yang; Jianbo Liu; Jiayin Tian; Yichun Zhang
computational intelligence and security | 2007
Jianbo Liu; Cheng Yang; Jiayin Tian
Archive | 2009
Yichun Zhang; Cheng Yang; Jianbo Liu; Jiayin Tian