An architecture for end-to-end quality of service provision and its experimental validation
An architecture for end-to-end quality of service provision and its experimental validation
Digital signatures for flows and multicasts
IEEE/ACM Transactions on Networking (TON)
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Efficient Multicast Packet Authentication Using Signature Amortization
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
Graph-Based Authentication of Digital Streams
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Multi-access services in heterogeneous wireless networks
Multi-access services in heterogeneous wireless networks
Scalable authentication of MPEG-4 streams
IEEE Transactions on Multimedia
Hi-index | 0.00 |
There are two main approaches for authenticating digital streams, namely the tree chaining [1] and the hash chaining [2,3]. Both approaches have their disadvantages. Hash chaining is superior for low communication overhead, however, it is not resilient to packet loss and it has a longer verification delay. On the other hand, tree chaining is more robust even if packet loss occurs and with shorter verification delay, but the communication overhead is too high to be tolerable, especially in online applications. In this paper, we try to combine the two techniques and propose a hybrid scheme for authenticating MPEG-2 streaming data, which are still used by real application systems, by taking advantage of the characteristics of MPEG frames. The hybrid approach is shown to be more effective as compared to the other two approaches.