[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Habib et al., 2005 - Google Patents

Verifying data integrity in peer-to-peer media streaming

Habib et al., 2005

View PDF
Document ID
948508200080052916
Author
Habib A
Xu D
Atallah M
Bhargava B
Chuang J
Publication year
Publication venue
Multimedia Computing and Networking 2005

External Links

Snippet

We study data integrity verification in peer-to-peer media streaming for content distribution. Challenges include the timing constraint of streaming as well as the untrustworthiness of peers. We show the inadequacy of existing data integrity verification protocols, and propose …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02TCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
    • Y02T10/00Road transport of goods or passengers
    • Y02T10/10Internal combustion engine [ICE] based vehicles
    • Y02T10/30Use of alternative fuels
    • Y02T10/36Multiple fuels, e.g. multi fuel engines

Similar Documents

Publication Publication Date Title
Park et al. Efficient multicast stream authentication using erasure codes
Krohn et al. On-the-fly verification of rateless erasure codes for efficient content distribution
Penrig et al. ELK, a new protocol for efficient large-group key distribution
Park et al. Efficient multicast packet authentication using signature amortization
Luk et al. Seven cardinal properties of sensor network broadcast authentication
Gkantsidis et al. Cooperative Security for Network Coding File Distribution.
KR100519770B1 (en) Method and apparatus for distributed certificate management for Ad-hoc networks
Challal et al. A taxonomy of multicast data origin authentication: Issues and solutions
US8175278B2 (en) Key management messages for secure broadcast
US20090259847A1 (en) Security protocols for hybrid peer-to-peer file sharing networks
Li et al. On the practical and security issues of batch content distribution via network coding
Kim et al. On counteracting byzantine attacks in network coded peer-to-peer networks
Hefeeda et al. Authentication schemes for multimedia streams: Quantitative analysis and comparison
US8140849B2 (en) Security for network coding file distribution
Azadmanesh et al. A reliable and efficient micro-protocol for data transmission over an RTP-based covert channel
Habib et al. Verifying data integrity in peer-to-peer media streaming
Habib et al. A tree-based forward digest protocol to verify data integrity in distributed media streaming
Gentry et al. End-to-end security in the presence of intelligent data adapting proxies: The case of authenticating transcoded streaming media
Challal et al. RLH: receiver driven layered hash-chaining for multicast data origin authentication
Son et al. Denial of service attack-resistant flooding authentication in wireless sensor networks
Chessa et al. Dependable and secure data storage in wireless ad hoc networks: an assessment of ds2
Lin et al. Lightweight, pollution-attack resistant multicast authentication scheme
He et al. Securing network coding against pollution attacks in p2p converged ubiquitous networks
Cucinotta et al. Adopting redundancy techniques for multicast stream authentication
Challal et al. Hybrid and Adaptive Hash-chaining scheme for data-streaming source authentication