Efficient Proxy-Based Internet Media Distribution Control and Privacy Protection Infrastructure
暂无分享,去创建一个
[1] Songqing Chen,et al. An Empirical Study of a Segment-Based Streaming Proxy in an Enterprise Environment , 2004, WCW.
[2] Antonio Ortega,et al. Scalable proxy caching of video under storage constraints , 2002, IEEE J. Sel. Areas Commun..
[3] Hermann Hellwagner,et al. Architecture of a quality based intelligent proxy (QBIX) for MPEG-4 videos , 2003, WWW '03.
[4] David K. Y. Yau,et al. A case for a multi-key secure video proxy: theory, design, and implementation , 2002, MULTIMEDIA '02.
[5] Yuval Ishai,et al. Protecting data privacy in private information retrieval schemes , 1998, STOC '98.
[6] Katherine Guo,et al. Silo, rainbow, and caching token: schemes for scalable, fault tolerant stream caching , 2002, IEEE J. Sel. Areas Commun..
[7] Dan Boneh,et al. A Method for Fast Revocation of Public Key Certificates and Security Capabilities , 2001, USENIX Security Symposium.
[8] Alan Kai-Hau Yeung,et al. Partial video sequence caching scheme for VOD systems with heterogeneous clients , 1997, Proceedings 13th International Conference on Data Engineering.
[9] Bharat K. Bhargava,et al. A fast MPEG video encryption algorithm , 1998, MULTIMEDIA '98.
[10] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[11] Alan Kai-Hau Yeung,et al. Partial video sequence caching scheme for VOD systems with heterogeneous clients , 1998, IEEE Trans. Ind. Electron..
[12] Robert H. Deng,et al. An Efficient and Practical Scheme for Privacy Protection in the E-Commerce of Digital Goods , 2000, ICISC.
[13] Zhi-Li Zhang,et al. Video staging: a proxy-server-based approach to end-to-end video delivery over wide-area networks , 2000, TNET.
[14] Robert H. Deng,et al. Secure and Private Distribution of Online Video and Some Related Cryptographic Issues , 2001, ACISP.
[15] Songwu Lu,et al. Commutative cipher based en-route filtering in wireless sensor networks , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.
[16] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[17] Feng Bao,et al. Collusion attack on a multi-key secure video proxy scheme , 2004, MULTIMEDIA '04.
[18] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[19] Deborah Estrin,et al. Multimedia proxy caching mechanism for quality adaptive streaming applications in the Internet , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[20] Michael K. Reiter,et al. Anonymous Web transactions with Crowds , 1999, CACM.
[21] Ralf Steinmetz,et al. Protecting VoD the easier way , 1998, MULTIMEDIA '98.
[22] Donald F. Towsley,et al. Proxy prefix caching for multimedia streams , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[23] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[24] Jussi Kangasharju,et al. Distributing layered encoded video through caches , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[25] Philip S. Yu,et al. Segment-based proxy caching of multimedia streams , 2001, WWW '01.
[26] Yiannis Tsiounis,et al. On the Security of ElGamal Based Encryption , 1998, Public Key Cryptography.
[27] Robert Tappan Morris,et al. Tarzan: a peer-to-peer anonymizing network layer , 2002, CCS '02.
[28] Jean-Sébastien Coron,et al. On the Security of RSA Padding , 1999, CRYPTO.
[29] Wenjun Zeng,et al. A format-compliant configurable encryption framework for access control of video , 2002, IEEE Trans. Circuits Syst. Video Technol..