Filters








85,358 Hits in 3.0 sec

Streaming Authenticated Data Structures [chapter]

Charalampos Papamanthou, Elaine Shi, Roberto Tamassia, Ke Yi
2013 Lecture Notes in Computer Science  
We propose streaming authenticated data structures, a model that enables efficient verification of data structure queries on a stream.  ...  We introduce streaming authenticated data structures, and design expressive and efficient schemes that do not require any interaction between the client and server while the stream is observed.  ...  We particularly thank Bobby Bhattacharjee for suggesting the bandwidth sharing application and the idea of composing multiple streams.  ... 
doi:10.1007/978-3-642-38348-9_22 fatcat:rczt6k3fqrgshphpmxysfpttku

Streaming Authenticated Data Structures

Yi Qian, Yupeng Zhang, Xi Chen, Charalampos Papamanthou
2014 Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security - CCSW '14  
(EUROCRYPT 2013) introduced streaming authenticated data structures (SADS) to address the above problem.  ...  s work and to a practical implementation of a streaming authenticated data structure that employs the efficient SWIFFT hash function, which we show to comply with our abstraction.  ...  data structure D h+1 along with the updated authenticated data structure auth(D h+1 ); 5.  ... 
doi:10.1145/2664168.2664177 dblp:conf/ccs/QianZCP14 fatcat:flgy3uvlmrg4rlx7fbuygztf4e

Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 Stream [chapter]

Tieyan Li, Huafei Zhu, Yongdong Wu
2005 Lecture Notes in Computer Science  
In this paper, we propose a multi-source stream authentication (mSSA) framework based on MPEG-4 stream format.  ...  Stream authentication is more complex since a stream may consist of multiple sources and be transcoded by intermediate proxies.  ...  Conclusions and Future Works We proposed the first secure multi-source authentication scheme for composite MPEG-4 stream.  ... 
doi:10.1007/11602897_33 fatcat:ta3433bulnc73aboeklnc3a6yy

AUTHENTICATION OF MP4 FILE BY PERCEPTUAL HASH AND DATA HIDING

April Pyone Maung Maung, Yiqi Tew, KokSheik Wong
2019 Malaysian Journal of Computer Science  
With advances in multimedia signal processing and abundance of data, multimedia authentication becomes more and more challenging and demanding.  ...  Although many prior techniques were put forward to authenticate individual video or audio stream, the cross-layer authentication of audio-visual content as a whole remains unexplored.  ...  However, the functionality of the proposed authentication method depends on the unique MP4 structure of specific devices, although MP4 itself is a wrapper where the real data are the audio and video streams  ... 
doi:10.22452/mjcs.vol32no4.4 fatcat:gctftkxv3velvpfzwsmifdumpu

Scalable authentication of MPEG-4 streams

Yongdong Wu, R.H. Deng
2006 IEEE transactions on multimedia  
This paper presents three scalable and efficient schemes for authenticating MPEG-4 streams: the Flat Authentication Scheme, the Progressive Authentication Scheme, and the Hierarchical Authentication Scheme  ...  All the schemes allow authentication of MPEG-4 streams over lossy networks by integrating seamlessly digital signatures and erasure correction coding with MPEG-4's fine granular scalability.  ...  Syntactic structure of an example MPEG-4 visual stream.  ... 
doi:10.1109/tmm.2005.861283 fatcat:u2vvjxwawzge7fjdmm5eamcqqu

Design and Implementation of Blockchain Based Single Sign-On Authentication System for Web Applications

Mustafa TANRIVERDİ
2020 Sakarya University Journal of Computer and Information Sciences  
In these times, blockchain technology offers solutions that make life easier in many areas thanks to its distributed, transparent, secure and immutable structure.  ...  Some of these studies have been third party identity authentication systems like Google and Facebook.  ...  The data stream feature of the MultiChain is suitable for this purpose in terms of performance and data storage structure.  ... 
doi:10.35377/saucis.03.03.757459 fatcat:bbjf4yssevbuvnk7i4cgqdnmzu

A novel unbalanced tree structure for low-cost authentication of streaming content on mobile and sensor devices

Thivya Kandappu, Vijay Sivaraman, Roksana Boreli
2012 2012 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON)  
Second, we present a theoretical model to quantify the benefits of our unbalanced tree structure in reducing startup delays for streaming applications by optimally readjusting the burden of authentication  ...  In this paper we explore how the structure of the Merkle tree can be adapted to improve playback performance for streaming content.  ...  As a secondary advantage, an imbalanced tree offers lower overall authentication cost when the user abandons the streaming data mid-stream (which happens very frequently as discussed earlier). A.  ... 
doi:10.1109/secon.2012.6275816 dblp:conf/secon/KandappuSB12 fatcat:wdpm5d2gjzgfneit6buremjxoi

Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN [chapter]

Tieyan Li, Yongdong Wu, Di Ma, Huafei Zhu, Robert H. Deng
2004 Lecture Notes in Computer Science  
The current packet based stream authentication schemes provide effective and efficient authentication over a group of packets transmitted on erasure channels.  ...  However, by fixing the packets in transmission, any packet manipulation will cause authentication failure.  ...  The scheme is also enriched by imaginative appliances like multi-source stream authentication. Our analysis shows that it is secure and cost-effective.  ... 
doi:10.1007/978-3-540-30191-2_7 fatcat:u36qkjlcwratrclt6hktkhbsje

Multi-dimensional Query Authentication for On-line Stream Analytics

Xiangrui Chen, Gyoung-Bae Kim, Hae-Young Bae
2010 KSII Transactions on Internet and Information Systems  
They are based on the general data model for OLSA, the stream cube. First, we improve the data structure of the H-tree, which is used to store the stream cube.  ...  In the scenario of data stream outsourcing, the data owner continuously publishes the latest data and associated authentication information through a service provider.  ...  They proposed structures for authenticating multi-dimensional selection and aggregation queries over sliding windows on data streams.  ... 
doi:10.3837/tiis.2010.04.005 fatcat:wtawdvhflzbw7l7hrd7b4djmz4

Flexible Layered Authentication Graph for Multimedia Streaming

Xinglei Zhu, Zhishou Zhang, Zhi Li, Qibin Sun
2007 2007 IEEE 9th Workshop on Multimedia Signal Processing  
In this paper, a new flexible layered authentication graph (FLAG) algorithm is proposed for multimedia streaming authentication.  ...  These flexibilities make FLAG an excellent candidate for multimedia streaming authentication, in that i) in the sender buffering mode, it allows elastic sending delay required by multimedia streaming congestion  ...  Our future works include developing UAP algorithms based on FLAG for certain media types such as H.264 video stream and further study of the authentication graph structures for media streaming by taking  ... 
doi:10.1109/mmsp.2007.4412888 dblp:conf/mmsp/ZhuZLS07 fatcat:7eg36nraxfed3mx2z2kuuplzbe

Authenticated data structures, generically

Andrew Miller, Michael Hicks, Jonathan Katz, Elaine Shi
2014 Proceedings of the 41st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages - POPL '14  
An authenticated data structure (ADS) is a data structure whose operations can be carried out by an untrusted prover, the results of which a verifier can efficiently check as authentic.  ...  We have implemented λ• as an extension to the OCaml compiler, and have used it to produce authenticated versions of many interesting data structures including binary search trees, red-black+ trees, skip  ...  [16] , which proposes a method for designing authenticated data structures for a class of data structures referred to as "search DAGs."  ... 
doi:10.1145/2535838.2535851 dblp:conf/popl/MillerHKS14 fatcat:6c25dlq6gjawfeepor4odef3li

End-to-end secure delivery of scalable video streams

Kianoosh Mokhtarian, Mohamed Hefeeda
2009 Proceedings of the 18th international workshop on Network and operating systems support for digital audio and video - NOSSDAV '09  
This flexibility, however, is not supported by current stream authentication schemes in the literature.  ...  We investigate the problem of securing the delivery of scalable video streams so that receivers can ensure the authenticity (originality and integrity) of the video.  ...  Accordingly, we first consider to authenticate the sequence of GoPs by applying data stream authentication techniques.  ... 
doi:10.1145/1542245.1542264 dblp:conf/nossdav/MokhtarianH09 fatcat:5xgkjpf5e5d2boiqga576akk3m

Design and Implementation about Secure Smart Electricity Meter Sealing Based on RF Tag

Zhenliu Zhou
2015 International Journal of Security and Its Applications  
Data structures, communication protocols, and secure mutual authentication protocol about this sealing are described.  ...  Particularly, this mutual authentication protocol is suitable for low-cost RF tags, and meets the State encryption control requirements for commercial encryption products.  ...  In this paper, Principles using RF tags as smart electricity meter sealing are proposed, data structures and communication protocols of this sealing are devised, finally, a kind of mutual authentication  ... 
doi:10.14257/ijsia.2015.9.6.09 fatcat:jqdeqaxkxbfrlowbxg5fct3v7y

Authenticated data structures, generically

Andrew Miller, Michael Hicks, Jonathan Katz, Elaine Shi
2014 SIGPLAN notices  
An authenticated data structure (ADS) is a data structure whose operations can be carried out by an untrusted prover, the results of which a verifier can efficiently check as authentic.  ...  We have implemented λ• as an extension to the OCaml compiler, and have used it to produce authenticated versions of many interesting data structures including binary search trees, red-black+ trees, skip  ...  [16] , which proposes a method for designing authenticated data structures for a class of data structures referred to as "search DAGs."  ... 
doi:10.1145/2578855.2535851 fatcat:feqxrapgyfh2dd72e7cguf2ege

Vulnerabilities of Live-Streaming Services in Korea

Sun-Hong Hwang, Ga-Yeong Kim, Su-Hwan Myeong, Tai-Sic Yun, Seung-Min Yoon, Tai-Ho Kim, Ieck-Chae Euom
2022 Sensors  
However, ensuring security with a grid computing system is difficult because the system exchanges general user traffic in a peer-to-peer (P2P) manner instead of receiving data from an authenticated server  ...  Recently, the number of users and the demand for live-streaming services have increased.  ...  Therefore, streaming data containing Data Flow Analysis in Mesh-Structured Grid Computing Environment Among the live-streaming services, Naver TV was the only service using the mesh structure, and the  ... 
doi:10.3390/s22103766 pmid:35632175 pmcid:PMC9147041 fatcat:52fngpjcfnbd3ihhni4yzfo5we
« Previous Showing results 1 — 15 out of 85,358 results