[go: up one dir, main page]

Habib et al., 2005 - Google Patents

Verifying data integrity in peer-to-peer media streaming

Habib et al., 2005

View PDF
Document ID
948508200080052916
Author
Habib A
Xu D
Atallah M
Bhargava B
Chuang J
Publication year
Publication venue
Multimedia Computing and Networking 2005

External Links

Snippet

We study data integrity verification in peer-to-peer media streaming for content distribution. Challenges include the timing constraint of streaming as well as the untrustworthiness of peers. We show the inadequacy of existing data integrity verification protocols, and propose …
Continue reading at raidlab.cs.purdue.edu (PDF) (other versions)

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02TCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
    • Y02T10/00Road transport of goods or passengers
    • Y02T10/10Internal combustion engine [ICE] based vehicles
    • Y02T10/30Use of alternative fuels
    • Y02T10/36Multiple fuels, e.g. multi fuel engines

Similar Documents

Publication Publication Date Title
Park et al. Efficient multicast stream authentication using erasure codes
Krohn et al. On-the-fly verification of rateless erasure codes for efficient content distribution
Penrig et al. ELK, a new protocol for efficient large-group key distribution
Luk et al. Seven cardinal properties of sensor network broadcast authentication
KR100519770B1 (en) Method and apparatus for distributed certificate management for Ad-hoc networks
CN101981890B (en) System and method for secure workgroup management and communication
Challal et al. A taxonomy of multicast data origin authentication: Issues and solutions
US20090259847A1 (en) Security protocols for hybrid peer-to-peer file sharing networks
EP1745587A1 (en) Key management messages for secure broadcast
Pallickara et al. A framework for secure end-to-end delivery of messages in publish/subscribe systems
Kim et al. On counteracting byzantine attacks in network coded peer-to-peer networks
Hefeeda et al. Authentication schemes for multimedia streams: Quantitative analysis and comparison
Azadmanesh et al. A reliable and efficient micro-protocol for data transmission over an RTP-based covert channel
US8140849B2 (en) Security for network coding file distribution
Habib et al. Verifying data integrity in peer-to-peer media streaming
Habib et al. A tree-based forward digest protocol to verify data integrity in distributed media streaming
Gentry et al. End-to-end security in the presence of intelligent data adapting proxies: The case of authenticating transcoded streaming media
Challal et al. RLH: receiver driven layered hash-chaining for multicast data origin authentication
Liu et al. A DRM architecture for manageable P2P based IPTV system
Lin et al. Lightweight, pollution-attack resistant multicast authentication scheme
Chessa et al. Dependable and secure data storage in wireless ad hoc networks: an assessment of ds2
He et al. Securing network coding against pollution attacks in p2p converged ubiquitous networks
Cucinotta et al. Adopting redundancy techniques for multicast stream authentication
Challal et al. Hybrid and Adaptive Hash-chaining scheme for data-streaming source authentication
Chen et al. A secure network coding based on broadcast encryption in sdn