Sciweavers

10 search results - page 1 / 2
» A proposal of butterfly-graph based stream authentication ov...
Sort
View
ICMCS
2005
IEEE
71views Multimedia» more  ICMCS 2005»
13 years 10 months ago
A proposal of butterfly-graph based stream authentication over lossy networks
In this paper, we propose a butterfly-graph based stream authentication scheme for lossy networks where the streaming packets could be lost in both random and burst ways. Due to t...
Zhishou Zhang, Qibin Sun, Wai-Choong Wong
ICIP
2007
IEEE
14 years 6 months ago
Stream Authentication Based on Generlized Butterfly Graph
This paper proposes a stream authentication method based on the Generalized Butterfly Graph (GBG) framework. Compared with the original Butterfly graph, the proposed GBG graph sup...
Zhishou Zhang, John G. Apostolopoulos, Qibin Sun, ...
ISCC
2006
IEEE
13 years 11 months ago
Layered Multicast Data Origin Authentication and Non-repudiation over Lossy Networks
— Security and QoS are two main issues for a successful wide deployment of multicast services. For instance, in a multicast streaming application, a receiver would require a data...
Yoann Hinard, Hatem Bettahar, Yacine Challal, Abde...
ISCC
2002
IEEE
110views Communications» more  ISCC 2002»
13 years 10 months ago
Authenticating real time packet streams and multicasts
In this work we propose a new stream authentication scheme that is suitable for live packet streams distributed over a lossy channel, such as an IP-multicast group. Packets are si...
Alain Pannetrat, Refik Molva
ICMCS
2006
IEEE
131views Multimedia» more  ICMCS 2006»
13 years 11 months ago
A Content-Aware Stream Authentication Scheme Optimized for Distortion and Overhead
This paper proposes a content-aware authentication scheme optimized to account for distortion and overhead for media streaming. When authenticated media is streamed over a lossy n...
Zhishou Zhang, Qibin Sun, Wai-Choong Wong, John G....