Analysis of authentication schemes for nonscalable video streams
暂无分享,去创建一个
[1] Lawrence Wai-Choong Wong,et al. Stream Authentication Based on Generlized Butterfly Graph , 2007, 2007 IEEE International Conference on Image Processing.
[2] Refik Molva,et al. Efficient Multicast Packet Authentication , 2003, NDSS.
[3] Rosario Gennaro,et al. How to Sign Digital Streams , 1997, Inf. Comput..
[4] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[5] Daniel A. Spielman,et al. Practical loss-resilient codes , 1997, STOC '97.
[6] Qi Tian,et al. A secure and robust approach to scalable video authentication , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).
[7] Heiko Schwarz,et al. Overview of the Scalable Video Coding Extension of the H.264/AVC Standard , 2007, IEEE Transactions on Circuits and Systems for Video Technology.
[8] Lawrence Wai-Choong Wong,et al. A proposal of butterfly-graph based stream authentication over lossy networks , 2005, 2005 IEEE International Conference on Multimedia and Expo.
[9] Yacine Challal,et al. A taxonomy of multicast data origin authentication: Issues and solutions , 2004, IEEE Communications Surveys & Tutorials.
[10] Gary J. Sullivan,et al. Video Compression - From Concepts to the H.264/AVC Standard , 2005, Proceedings of the IEEE.
[11] Roni Even,et al. RTP Payload Format for H.264 Video , 2011, RFC.
[12] Mohan S. Kankanhalli,et al. A scalable signature scheme for video authentication , 2006, Multimedia Tools and Applications.
[13] Miska M. Hannuksela,et al. RTP Payload Format for H.264 Video , 2005, RFC.
[14] Yookun Cho,et al. The eSAIDA Stream Authentication Scheme , 2004, ICCSA.
[15] Bharat K. Bhargava,et al. A tree-based forward digest protocol to verify data integrity in distributed media streaming , 2005, IEEE Transactions on Knowledge and Data Engineering.
[16] Johann Großschädl,et al. A Survey of Public-Key Cryptography on J2ME-Enabled Mobile Devices , 2004, ISCIS.
[17] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[18] Donald F. Towsley,et al. Measurement and modelling of the temporal dependence in packet loss , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[19] Vlastimil Klíma,et al. Tunnels in Hash Functions: MD5 Collisions Within a Minute , 2006, IACR Cryptol. ePrint Arch..
[20] Ralph C. Merkle,et al. A Certified Digital Signature , 1989, CRYPTO.
[21] Philippe Golle,et al. Authenticating Streamed Data in the Presence of Random Packet Loss , 2001, NDSS.
[22] Edwin K. P. Chong,et al. Efficient multicast stream authentication using erasure codes , 2003, TSEC.
[23] Michael O. Rabin,et al. Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.
[24] Vlastimil Klíma. Finding MD5 Collisions - a Toy For a Notebook , 2005, IACR Cryptol. ePrint Arch..
[25] Simon S. Lam,et al. Digital signatures for flows and multicasts , 1998, Proceedings Sixth International Conference on Network Protocols (Cat. No.98TB100256).
[26] Hitesh Tewari,et al. Performance analysis of cryptographic protocols on handheld devices , 2004, Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings..