Dissertation > Excellent graduate degree dissertation topics show

Research and Design of Secure Comunication of NVD on Demand System

Author: LiaoLing
Tutor: XieChangSheng
School: Huazhong University of Science and Technology
Course: Computer System Architecture
Keywords: NVD on Demand Identity-Based Cryptography Network security Communication protocol
CLC: TP309
Type: Master's thesis
Year: 2011
Downloads: 1
Quote: 0
Read: Download Dissertation

Abstract


With the prospering market of high-defined TV, Blue-Ray Disc wants its share for a long time. If China choosed Blue-Ray to be the standard, a lot of patent fees needs to be payed for each palyer producted by Chinese factory. In this background, NVD, who is totally owned by china, is given birth to in 2006.NVD on Demand system is a new model of playing NVD discs, including four parts: NVD disc, NVD player, management server and certificate server. Its main idea is that users get encrypted high-defined discs from movie providers for free. They request to be granted the key for the disc each time they play the disc.One problem is, how to assure security of NVD on Demand system communiction.NVD on Demand system is facing lots of security defects and threats.NVD on Demand system communication should reach security golas including password security, autnentication etc. As a embedded set, NVD player has limited cpu power and its contents of communication is sually short. Some security mechanisms needed is pointed out.Identity-Based NVD on Demand Seurityy Protocol (IBNODSP) is presented as a solution for communication security of NVD on Demand. It avoids the defects of traditional mechanism and has their goods. IBNODSP presents detailed schemes for identity authentication and private key districution, which are considered to be the two main problems in IBC.The following security services are provided by IBNODSP: authentication between two sides, secure communication, repudiability, resistence against replay atacks,etc.

Related Dissertations

  1. The Research of Malware Detection Technology Based on Active Mode,TP393.08
  2. Topology Measurement and Security Analysis on Gnutella and eMule Network,TP393.08
  3. Research on Temperature Control System for High-Performance Oven-Control Crystal Oscillator (OCXO),TN752
  4. Region-based wireless sensor network key management scheme for research,TP212.9
  5. SX Provincial Public Security Bureau Network Security Corps Performance Evaluation Index System Design,D631.1
  6. The Research of Insurance Network Marketing of China Insurance Company,F724.6
  7. Study on Network Technology of Wireless Bridge Monitoring System Based on MOAP,TP274
  8. Research and Implemention of Information Security Encryption System Based on the RSA,TP309.7
  9. The Research of Attack Source Traceback in Distributed Denial-of-Service Attacks Based on VoIP,TP393.08
  10. Design and Implementation of the CAN-Ethernet communication protocol converter based on ARM9,TP273.5
  11. Research on Streaming Media Detection Methods Against DoS\DDoS Attack Based on Analysis of Self-similarity,TP393.08
  12. Firewall and three switch - based campus network security policy research,TP393.08
  13. QH Software Services Marketing Strategy,F426.672
  14. Fast protocol identification based firewall system design and implementation,TP393.08
  15. IPsec-based remote access to corporate network systems design and implementation,TP393.08
  16. Behavior -based botnet detection method,TP393.08
  17. Substation Voltage and Reactive Power Optimization Control Strategy and Implementation,TM761.1
  18. Study browser security issues and solutions,TP393.092
  19. The Research of Security Issues in Cognitive Radio Networks,TN915.08
  20. The Design and Implementation of an Online Shopping System Based on PKI,TP393.09

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > General issues > Security and confidentiality
© 2012 www.DissertationTopic.Net  Mobile