SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Efficient Authentication and Signing of Multicast Streams over Lossy Channels
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Using an efficient hash chain and delaying function to improve an e-lottery scheme
International Journal of Computer Mathematics
A Survey of RFID Authentication Protocols Based on Hash-Chain Method
ICCIT '08 Proceedings of the 2008 Third International Conference on Convergence and Hybrid Information Technology - Volume 02
RLH: receiver driven layered hash-chaining for multicast data origin authentication
Computer Communications
Optimization of file allocation for video sharing servers
NTMS'09 Proceedings of the 3rd international conference on New technologies, mobility and security
Efficient constructions for one-way hash chains
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Hash chain links resynchronization methods in video streaming security: performance comparison
Journal of Mobile Multimedia
Hi-index | 0.00 |
The prospection of video streaming security has been changed considerably during the last years. With the new generation of hand healed devices and the delivery rate up to 2 Mb/s, the new prospection searched for fast security measures that have no great effects on the streaming fluidity. The hash chain has been largely used for such applications. The benefits from this deployment are the fast and the light calculations. But, the hash chain still suffers from some drawbacks related to chain link and robustness. This work studies different methods for achieving resynchronisation state for hash chain link. It also proposes a hybrid algorithm based on redundancy codes and windows flow which called Redundancy Code Synchronization Recovery State (RC-SRS). This technique merges the pros of all methods and avoids the cons of them. In the end, analytical and simulation results for the hybrid algorithm have been made. The results indicate that, that proposal has a good overall performance in terms of complexity and calculation time.