International Conference on Internet Surveillance and Protection (ICISP’06)
DOI: 10.1109/icisp.2006.30
|View full text |Cite
|
Sign up to set email alerts
|

SEMAFOR: A Framework for Authentication of Aadaptive Multimedia Content and Delivery for Heterogeneous Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 5 publications
0
5
0
Order By: Relevance
“…While we have only touched upon some of the issues necessary for deploying Merkle hash tree based authentication schemes for adaptive multimedia content in this short paper, an extended article is available (Kaced and Moissinac, 2006b) that provides more details, including: a deeper look at Merkle tree maintenance, algorithms for the verification procedures, and experiments and experiences with an actual implementation.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…While we have only touched upon some of the issues necessary for deploying Merkle hash tree based authentication schemes for adaptive multimedia content in this short paper, an extended article is available (Kaced and Moissinac, 2006b) that provides more details, including: a deeper look at Merkle tree maintenance, algorithms for the verification procedures, and experiments and experiences with an actual implementation.…”
Section: Resultsmentioning
confidence: 99%
“…XSST allows both Proxy and Server sign the messages, this signature can be generated directly by the proxy and server, or by other applications which the XSST interacts with. More informations about XSST can be found in (Kaced and Moissinac, 2006b). Figure 3 illustrates the operations between the multimedia server S and the proxy P, and the operations between the proxy P and the client C for requesting and adapting the multimedia data.…”
Section: Xsstmentioning
confidence: 99%
“…However, unlike [56], random packet loss is not handled. The authors presented the implementation of their work in [60]. Suzuki et al [61] proposed a similar approach.…”
Section: Approaches Based On Hash Treesmentioning
confidence: 95%
“…Content delivery (or distribution) network technologies have been investigated for years and have evolved to incorporate content adaptation management mechanisms into the exiting infrastructure [7], [8]. Though many technologies from different aspects of the content delivery chain need to be addressed separately, such as context collection and representation, adaptation algorithm and its execution, adaptation decision-making etc., the biggest challenge remains as the infrastructure design where content adaptation can be carried out with efficiency as well as flexibility.…”
Section: Adaptation Management In Content Delivery Networkmentioning
confidence: 99%
“…If it is on a proxy (e.g. [8]), the adaptation of the content could be clearly separated from both the user and the content provider. This allows the user and the provider to focus on their own jobs.…”
Section: Adaptation Management In Content Delivery Networkmentioning
confidence: 99%