Ensuring trust and confidentiality for adaptive video streaming in ICN
暂无分享,去创建一个
[1] Hermann Hellwagner,et al. A scalable video coding dataset and toolchain for dynamic adaptive streaming over HTTP , 2015, MMSys.
[2] Chang Wen Chen,et al. Attribute-based multi-dimension scalable access control for social media sharing , 2016, 2016 IEEE International Conference on Multimedia and Expo (ICME).
[3] Joud Khoury,et al. An Efficient and Expressive Access Control Architecture for Content-Based Networks , 2014, 2014 IEEE Military Communications Conference.
[4] Cong Wang,et al. Enabling secure and effective near-duplicate detection over encrypted in-network storage , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.
[5] Marina Blanton,et al. Dynamic and Efficient Key Management for Access Hierarchies , 2009, TSEC.
[6] Xiaofei Wang,et al. Cloud-assisted adaptive video streaming and social-aware video prefetching for mobile users , 2013, IEEE Wireless Communications.
[7] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.
[8] Bruno Sinopoli,et al. A Control-Theoretic Approach for Dynamic Adaptive Video Streaming over HTTP , 2015, Comput. Commun. Rev..
[9] Deborah Estrin,et al. Named Data Networking (NDN) Project , 2010 .
[10] Ian Miers,et al. Charm: a framework for rapidly prototyping cryptosystems , 2013, Journal of Cryptographic Engineering.
[11] Van Jacobson,et al. Networking named content , 2009, CoNEXT '09.
[12] Hui Li,et al. Owner Specified Excessive Access Control for Attribute Based Encryption , 2016, IEEE Access.
[13] V. Jacobson,et al. Securing Network Content , 2009 .
[14] Heiko Schwarz,et al. Overview of the Scalable Video Coding Extension of the H.264/AVC Standard , 2007, IEEE Transactions on Circuits and Systems for Video Technology.
[15] Jan Camenisch,et al. A Signature Scheme with Efficient Protocols , 2002, SCN.
[16] Yaning Liu,et al. Dynamic adaptive streaming over CCN: A caching and overhead analysis , 2013, 2013 IEEE International Conference on Communications (ICC).
[17] Jianping Wu,et al. On adapting HTTP protocol to content centric networking , 2012, CFI.
[18] Bengt Ahlgren,et al. Secure Naming for a Network of Information , 2010, 2010 INFOCOM IEEE Conference on Computer Communications Workshops.
[19] Yonggang Wen,et al. Towards name-based trust and security for content-centric network , 2011, 2011 19th IEEE International Conference on Network Protocols.
[20] Robert H. Deng,et al. Attribute-Based Access to Scalable Media in Cloud-Assisted Content Sharing Networks , 2013, IEEE Transactions on Multimedia.
[21] Nikos Fotiou,et al. A Survey of Information-Centric Networking Research , 2014, IEEE Communications Surveys & Tutorials.
[22] Hao Yue,et al. RAAC: Robust and Auditable Access Control With Multiple Attribute Authorities for Public Cloud Storage , 2017, IEEE Transactions on Information Forensics and Security.
[23] Yong Man Ro,et al. Scalable Protection and Access Control in Full Scalable Video Coding , 2006, IWDW.
[24] Christian Timmerer,et al. Adaptive streaming over Content Centric Networks in mobile networks using multiple links , 2013, 2013 IEEE International Conference on Communications Workshops (ICC).
[25] Dijiang Huang,et al. Attribute-based Access Control for ICN Naming Scheme , 2014, IEEE Transactions on Dependable and Secure Computing.
[26] Chang Wen Chen,et al. Secure media sharing in the cloud: Two-dimensional-scalable access control and comprehensive key management , 2014, 2014 IEEE International Conference on Multimedia and Expo (ICME).
[27] Christian Timmerer,et al. An experimental analysis of Dynamic Adaptive Streaming over HTTP in Content Centric Networks , 2013, 2013 IEEE International Conference on Multimedia and Expo (ICME).
[28] Satyajayant Misra,et al. Security, Privacy, and Access Control in Information-Centric Networking: A Survey , 2016, IEEE Communications Surveys & Tutorials.
[29] Cong Wang,et al. Toward Encrypted Cloud Media Center With Secure Deduplication , 2017, IEEE Transactions on Multimedia.
[30] Pekka Nikander,et al. Secure naming in information-centric networks , 2010, ReARCH '10.
[31] Yiran Wei,et al. Hop-by-hop adaptive video streaming in content centric network , 2016, 2016 IEEE International Conference on Communications (ICC).