PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

On a method to authenticate and verify digital streams

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Recently, digital streams have become widely used to make audio, video, and other media available in real-time over the Internet. As with other transmission methods, the recipient needs to have a possibilty to verify the source and authenticity of the received information. Several techniques have been proposed to deal with this issue. Most of them are vulnerable to packet losses or they introduce unacceptable computational and/or communication overheads. Some of the graph-based techniques provide immunity to burst losses of certain length. However, these techniques are not immune to the loss of packets containing signatures or occasional burst of lengths greater than the assumed one. In the paper, we propose a modification to one of the graph-based techniques that introduces immunity to the loss of packets containing signatures, without introducing any additional overheads.
Rocznik
Tom
Strony
45--52
Opis fizyczny
Bibliogr. 18 poz., tab., rys.
Twórcy
autor
  • University of Wollongong, Wollongong, Australia
autor
  • University of Wollongong, Wollongong, Australia
  • University of Wollongong, Wollongong, Australia
Bibliografia
  • [1] W. Stalings, Data and Computer Communications. 6th ed. Upper Saddle River: Prentice Hall, 2000.
  • [2] J. Lu, “Signal processing for Internet video streaming”, Proc. SPIE, Image and Video Commun. Proc., Jan. 2000.
  • [3] G. Pipkin, “Video on the web”, http://www.itc.virginia.edu/atg/techtalks/powerpoint/video/sld001.htm (accessed on 23/11/01).
  • [4] “Utah education network”, http://www.uen.org/technical/html/streamingfaq.html (accessed on 23/11/01).
  • [5] R. Gennaro and P. Rohatgi, “How to sign digital streams”, In Cypto ’97. Springer-Verlag, 1998, pp. 180–197.
  • [6] C. K. Wong and S. S. Lam, “Digital signatures for flows and multicasts”, IEEE/ACM Trans. Netw., vol. 7. no. 4, pp. 502–513, 1999.
  • [7] M. J. Moyer, J. R. Rao, and P. Rohatgi, “A survey of security issues in multicast communications”, IEEE Network, pp. 12–23, Nov./Dec.1999.
  • [8] D. R. Stinson, Cryptography Theory and Practice. CRC Press.
  • [9] A. Perrig, R. Canetti, J. D. Tygar, and D. Song, “Efficient authentication and signing of multicast streams over lossy channels”, In Proc. IEEE Secur. Priv. Symp., May 2000, pp. 56–73.
  • [10] P. Golle and N. Modadugu, “Authenticating streamed data in the presence of random packet loss”, in Proc. Netw. Distrib. Syst. Secur. Symp., 8–9 Feb. 2001.
  • [11] P. Golle and N. Modadugu, “Authenticating streamed data in the presence of random packet loss”, http://www.isoc.org/isoc/conferences/ndss/01/2001/papers/golle.pdf (accessed on: 12/02/02).
  • [12] W. Stalings, Cryptography and Network Security: Principles and Practice. 2nd ed. Upper Saddle River: Prentice Hall, 1998.
  • [13] A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography. CRC Press, 1996.
  • [14] P. Golle, ”Authenticating streamed data in the presence of random packet loss”, power point presentation, http://crypto.stanford.edu/˜pgolle/papers/auth.html (accessed on: 10/12/01).
  • [15] S. Miner and J. Staddon, “Graph-based authentication of Digital streams”, http://www-cse.ucsd.edu/users/sminer/abstracts/GraphAuth.html (accessed on: 11/01/02).
  • [16] E. N. Gilbert, “Capacity of burst-noise channel”, Bell Syst. Techn. J., pp. 1253–1265, Sept. 1960.
  • [17] E. O. Elliott, “Estimates of error rates for codes on burst-noise channels”, Bell Syst. Techn. J., pp. 1977–1997, Sept. 1963.
  • [18] J. M. Boyce and R. D. Gaglianello, “Packet loss effects on MPEG video sent over the public Internet”, in ACM Multimedia ’98, Electron. Proc
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BPS2-0018-0014
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.