Cited By
View all- Abd-Elrahman EBoutabia MAfifi H(2011)Hash chain links resynchronization methods in video streaming securityJournal of Mobile Multimedia10.5555/2011088.20110947:1(89-112)Online publication date: 1-Apr-2011
This paper provides a performance study for securing media streaming based on hash chain methodology. We introduce a new technique that combines the signature of window-based hash chain with redundancy codes for achieving high reliability and robustness ...
Hash chains provide a secure and light way of security to data authentication including two aspects: Data Integrity and Data Origin Authentication. The real challenge of using the hash chains is how it could recover the synchronization state and ...
Peer-to-peer media streaming is a scalable way to multicast real-time contents toward a large number of peers. In multi-stream streaming systems such as P2PTV, peers continuously switch between media streams at a high rate. This leads to data loss, data ...
Association for Computing Machinery
New York, NY, United States
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in