SIGGRAPH '96 Proceedings of the 23rd annual conference on Computer graphics and interactive techniques
Networked virtual environments: design and implementation
Networked virtual environments: design and implementation
Chord: A scalable peer-to-peer lookup service for internet applications
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Efficient simplification of point-sampled surfaces
Proceedings of the conference on Visualization '02
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION
DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION
Scalable Supernode Selection in Peer-to-Peer Overlay Networks
HOT-P2P '05 Proceedings of the Second International Workshop on Hot Topics in Peer-to-Peer Systems
A case for 3D streaming on peer-to-peer networks
Proceedings of the eleventh international conference on 3D web technology
Byzantine fault tolerant public key authentication in peer-to-peer systems
Computer Networks: The International Journal of Computer and Telecommunications Networking - Management in peer-to-peer systems
Public Authentication of 3D Mesh Models
WI '06 Proceedings of the 2006 IEEE/WIC/ACM International Conference on Web Intelligence
SHAD: A Human-Centered Security Architecture for the Plan B Operating System
PERCOM '07 Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications
Colyseus: a distributed architecture for online multiplayer games
NSDI'06 Proceedings of the 3rd conference on Networked Systems Design & Implementation - Volume 3
A survey of watermarking algorithms for image authentication
EURASIP Journal on Applied Signal Processing
An analytical model for progressive mesh streaming
Proceedings of the 15th international conference on Multimedia
Network-Based Visualization of 3D Landscapes and City Models
IEEE Computer Graphics and Applications
Donnybrook: enabling large-scale, high-speed, peer-to-peer games
Proceedings of the ACM SIGCOMM 2008 conference on Data communication
Receiver-driven view-dependent streaming of progressive mesh
Proceedings of the 18th International Workshop on Network and Operating Systems Support for Digital Audio and Video
Selection strategies for peer-to-peer 3D streaming
Proceedings of the 18th International Workshop on Network and Operating Systems Support for Digital Audio and Video
Security proofs for signature schemes
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Source authentication of media streaming based on chains of iso-hash clusters
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
Peer-to-Peer authentication with a distributed single sign-on service
IPTPS'04 Proceedings of the Third international conference on Peer-to-Peer Systems
3D Model Streaming Based on JPEG 2000
IEEE Transactions on Consumer Electronics
VON: a scalable peer-to-peer network for virtual environments
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
In recent years, interactive virtual environments such as Second Life, and virtual globe applications such as Google Earth, have become very popular. However, delivering massive amounts of interactive content to millions of potential users brings enormous challenges to content providers. Distributed peer-to-peer (P2P) approaches have thus been proposed to increase the system scalability in affordable ways. Building content delivery systems based on P2P approaches nevertheless creates security concerns for commercial vendors. This paper presents a generic system model for subscription-based service providers to adopt P2P-based, non-linear streaming for interactive content. We also propose solutions to the issue of content authentication, such that paying customers can be sure of the authenticity of the content retrieved from other users. Other practical security issues in an extended system model are also identified to allow further investigations in this problem space.