Habib et al., 2005 - Google Patents
Verifying data integrity in peer-to-peer media streamingHabib et al., 2005
View PDF- Document ID
- 948508200080052916
- Author
- Habib A
- Xu D
- Atallah M
- Bhargava B
- Chuang J
- Publication year
- Publication venue
- Multimedia Computing and Networking 2005
External Links
Snippet
We study data integrity verification in peer-to-peer media streaming for content distribution. Challenges include the timing constraint of streaming as well as the untrustworthiness of peers. We show the inadequacy of existing data integrity verification protocols, and propose …
- 238000004891 communication 0 abstract description 23
Classifications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02T—CLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
- Y02T10/00—Road transport of goods or passengers
- Y02T10/10—Internal combustion engine [ICE] based vehicles
- Y02T10/30—Use of alternative fuels
- Y02T10/36—Multiple fuels, e.g. multi fuel engines
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Park et al. | Efficient multicast stream authentication using erasure codes | |
Krohn et al. | On-the-fly verification of rateless erasure codes for efficient content distribution | |
Penrig et al. | ELK, a new protocol for efficient large-group key distribution | |
Park et al. | Efficient multicast packet authentication using signature amortization | |
Luk et al. | Seven cardinal properties of sensor network broadcast authentication | |
Gkantsidis et al. | Cooperative Security for Network Coding File Distribution. | |
KR100519770B1 (en) | Method and apparatus for distributed certificate management for Ad-hoc networks | |
Challal et al. | A taxonomy of multicast data origin authentication: Issues and solutions | |
US8175278B2 (en) | Key management messages for secure broadcast | |
US20090259847A1 (en) | Security protocols for hybrid peer-to-peer file sharing networks | |
Li et al. | On the practical and security issues of batch content distribution via network coding | |
Kim et al. | On counteracting byzantine attacks in network coded peer-to-peer networks | |
Hefeeda et al. | Authentication schemes for multimedia streams: Quantitative analysis and comparison | |
US8140849B2 (en) | Security for network coding file distribution | |
Azadmanesh et al. | A reliable and efficient micro-protocol for data transmission over an RTP-based covert channel | |
Habib et al. | Verifying data integrity in peer-to-peer media streaming | |
Habib et al. | A tree-based forward digest protocol to verify data integrity in distributed media streaming | |
Gentry et al. | End-to-end security in the presence of intelligent data adapting proxies: The case of authenticating transcoded streaming media | |
Challal et al. | RLH: receiver driven layered hash-chaining for multicast data origin authentication | |
Son et al. | Denial of service attack-resistant flooding authentication in wireless sensor networks | |
Chessa et al. | Dependable and secure data storage in wireless ad hoc networks: an assessment of ds2 | |
Lin et al. | Lightweight, pollution-attack resistant multicast authentication scheme | |
He et al. | Securing network coding against pollution attacks in p2p converged ubiquitous networks | |
Cucinotta et al. | Adopting redundancy techniques for multicast stream authentication | |
Challal et al. | Hybrid and Adaptive Hash-chaining scheme for data-streaming source authentication |