咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 ><i>H<sub>2</sub>A</i>:: Hybrid... 收藏

<i>H<sub>2</sub>A</i>:: Hybrid Hash-chaining scheme for adaptive multicast source authentication of media-streaming

H2A : 混合锁住回锅肉丁的计划为适应多点传送来源认证中等流

作     者:Challal, Y Bouabdallah, A Bettahar, H 

作者机构:Univ Technol Compiegne Dept Comp Sci Heudiasyc Lab Royallieu Res Ctr F-60205 Compiegne France 

出 版 物:《COMPUTERS & SECURITY》 (计算机与安全)

年 卷 期:2005年第24卷第1期

页      面:57-68页

核心收录:

学科分类:08[工学] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

主  题:data source authentication non-repudiation adaptive hash-chaining multicast flows multicast security 

摘      要:Many applications, such as broadcasting stock quotes and video-conferencing require data source authentication of the received multicast traffic. Multicast data source authentication must take into consideration the scalability and the efficiency of the underlying cryptographic schemes and mechanisms, because multicast groups can be very large and the exchanged data are likely to be important in volume (streaming). Besides, multicast data source authentication must be robust enough against packet loss because most of multicast multimedia applications do not use reliable packet delivery. In this paper, we propose a hybrid hash-chaining scheme in conjunction with an adaptive and efficient data source authentication protocol which tolerates packet loss and guarantees non-repudiation of media-streaming origin. We have simulated our protocol using NS-2, and the simulation results show that the protocol has remarkable features and efficiency compared to other recent data source authentication protocols. (C) 2005 Elsevier Ltd. All rights reserved.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分