-
1
-
-
0004773692
-
RTP payload format for H.261 video stream
-
T. Turletti, and C. Huitema, "RTP Payload Format for H.261 Video Stream," RFC 2032, 1996
-
(1996)
RFC 2032
-
-
Turletti, T.1
Huitema, C.2
-
2
-
-
1542521233
-
15444-3 amendment 2, motion JPEG 2000, motion JPEG 2000 version 2, MJP2 derived from ISO media file format
-
ISO/IEC JTC 1/SC 29/WG1 N2780F, 24/01/2003
-
Takahiro Fukuhara, and David Singer, "15444-3 Amendment 2, Motion JPEG 2000, Motion JPEG 2000 Version 2, MJP2 derived from ISO Media File Format," ISO/IEC JTC 1/SC 29/WG1 N2780F, 24/01/2003
-
-
-
Fukuhara, T.1
Singer, D.2
-
4
-
-
29844433716
-
ISO 154447 ITU-T recommendation T.800
-
ISO 154447 ITU-T Recommendation T.800, http://www.jpeg.org
-
-
-
-
5
-
-
0036132948
-
An overview of the JPEG2000 still image compression standard
-
Majid Rabbani, and Rajan Joshi, "An overview of the JPEG2000 still image compression standard," Signal Processing: Image Communication, 17, pp. 3-48, 2002.
-
(2002)
Signal Processing: Image Communication
, vol.17
, pp. 3-48
-
-
Rabbani, M.1
Joshi, R.2
-
7
-
-
0010227314
-
Digital signatures for flows and multicasts
-
Chung Kei Wong, and Simon S. Lam, "Digital Signatures for Flows and Multicasts," IEEE ICNP'98
-
IEEE ICNP'98
-
-
Wong, C.K.1
Lam, S.S.2
-
8
-
-
0033690336
-
Efficient authentication and signature of multicast streams over lossy channels
-
A. Perrig, R. Canetti, D. Tygar, and D. Song, "Efficient Authentication and Signature of Multicast Streams over Lossy Channels," IEEE Symposium on Security and Privacy, 2000.
-
IEEE Symposium on Security and Privacy, 2000
-
-
Perrig, A.1
Canetti, R.2
Tygar, D.3
Song, D.4
-
10
-
-
0036079874
-
Efficientmulticast packet authentication using signature amortisation
-
Jung Min Park, Edwin K. P. Chong, and Howard Jay Siegel, "Efficient Multicast Packet Authentication Using Signature Amortisation," IEEE Symposium on Security and Privacy, pp. 227-240, 2002
-
(2002)
IEEE Symposium on Security and Privacy
, pp. 227-240
-
-
Park, J.M.1
Chong, E.K.P.2
Siegel, H.J.3
-
11
-
-
1542625909
-
Efficient multicast stream authentication using erasure codes
-
Jung Min Park, Edwin K. P. Chong, and Howard Jay Siegel, "Efficient multicast stream authentication using erasure codes," ACM Transactions on Information and System Security, 6(2):258-285, 2003
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, Issue.2
, pp. 258-285
-
-
Park, J.M.1
Chong, E.K.P.2
Siegel, H.J.3
-
12
-
-
35048891868
-
Keying hash functions for message authentication
-
M. Bellare, R. Canetti, and H. Krawczyk, "Keying Hash Functions for Message Authentication," CRYPTO'96, LNCS 1109, pp. 1-15, 1996
-
(1996)
CRYPTO'96, LNCS 1109
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
13
-
-
0033280006
-
A compact and fast hybrid signature scheme for multicast packet authentication
-
P. Rohatgi. "A Compact and Fast Hybrid Signature Scheme for Multicast Packet Authentication," 6th ACM Conference on Computer and Communication Security, pp.93-100, 1999.
-
(1999)
6th ACM Conference on Computer and Communication Security
, pp. 93-100
-
-
Rohatgi, P.1
-
14
-
-
15744368857
-
Efficient and secure source authentication for multicast
-
A. Perrig, R. Canetti, D. Tygar, and D. Song, "Efficient and Secure Source Authentication for Multicast," ISOC Network and Distributed System Security Symposium (NDSS), 2001
-
ISOC Network and Distributed System Security Symposium (NDSS), 2001
-
-
Perrig, A.1
Canetti, R.2
Tygar, D.3
Song, D.4
-
15
-
-
85180799647
-
Authenticating streamed data in the presence of random packet loss
-
Philippe Golle, and Nagendra Modadugu, "Authenticating Streamed Data in the Presence of Random Packet Loss," NDSS 2001
-
NDSS 2001
-
-
Golle, P.1
Modadugu, N.2
-
16
-
-
85180537111
-
Efficient multicast packet authentication
-
Alain Pannetrat, and Refik Molva, "Efficient Multicast Packet Authentication," NDSS 2003
-
NDSS 2003
-
-
Pannetrat, A.1
Molva, R.2
-
17
-
-
84974694679
-
Efficient object-based stream authentication
-
Yongdong Wu, Di Ma, and Changsheng Xu, "Efficient Object-based Stream Authentication," Indocrypto 2002, LNCS 2551, pp.354-367
-
Indocrypto 2002, LNCS 2551
, pp. 354-367
-
-
Wu, Y.1
Ma, D.2
Xu, C.3
-
18
-
-
0034792761
-
Scalable streaming of JPEG2000 images using hypertext transfer protocol
-
S. Deshpande, and W. Zeng, "Scalable streaming of JPEG2000 images using Hypertext Transfer Protocol," ACM Multimedia, 2001
-
(2001)
ACM Multimedia
-
-
Deshpande, S.1
Zeng, W.2
-
19
-
-
0032155046
-
A survey of packet-loss recovery techniques for streaming audio
-
Colin Perkins, Orion Hodson, and Vicky Hardman, "A Survey of Packet-Loss Recovery Techniques for Streaming Audio," IEEE Network, 1998, pp.40-48
-
(1998)
IEEE Network
, pp. 40-48
-
-
Perkins, C.1
Hodson, O.2
Hardman, V.3
-
21
-
-
84962120837
-
A survey of error-concealment schemes for real-time audio and video transmissions over the internet
-
B. W. Wah, X. Su, and D. Lin, "A Survey of Error-Concealment Schemes for Real-Time Audio and Video Transmissions over the Internet," Int'l Symposium on Multimedia Software Engineering, 2000, pp. 17-24
-
Int'l Symposium on Multimedia Software Engineering, 2000
, pp. 17-24
-
-
Wah, B.W.1
Su, X.2
Lin, D.3
-
22
-
-
0033706694
-
Error concealment for SNR scalable video coding in wireless communication
-
Andre Kaup, "Error Concealment for SNR Scalable Video Coding in Wireless Communication," Visual Communications and Image Processing 2000}, Vol. 4067, pp. 175-186.
-
Visual Communications and Image Processing 2000
, vol.4067
, pp. 175-186
-
-
Kaup, A.1
-
25
-
-
0035578066
-
Unequal packet loss resilience for fine-granular-scalability video
-
M. van der Schaar, and Hayder Radha, "Unequal packet loss resilience for fine-granular-scalability video," IEEE Transactions on Multimedia, 3(4):381-391, 2001
-
(2001)
IEEE Transactions on Multimedia
, vol.3
, Issue.4
, pp. 381-394
-
-
Van Der Schaar, M.1
Radha, H.2
-
26
-
-
0034205865
-
Unequal error protection of SPIHT encoded image bit streams
-
A.A. Alatan, M. Zhao, and A. N Akansu, "Unequal error protection of SPIHT encoded image bit streams," IEEE Journal of Selected Areas in Communications1, 8(6):814-818, 2000
-
(2000)
IEEE Journal of Selected Areas in Communications 1
, vol.8
, Issue.6
, pp. 814-818
-
-
Alatan, A.A.1
Zhao, M.2
Akansu, A.N.3
-
27
-
-
0034205048
-
Unequal loss protection: Graceful degradation of image quality over packet erasure channels through forward error correction
-
A.E. Mohr, E.A. Riskin, and R.E Ladner, "Unequal loss protection: graceful degradation of image quality over packet erasure channels through forward error correction," IEEE Journal on Selected Areas in Communications, 18(6):819-828, 2000
-
(2000)
IEEE Journal on Selected Areas in Communications
, vol.18
, Issue.6
, pp. 819-828
-
-
Mohr, A.E.1
Riskin, E.A.2
Ladner, R.E.3
-
28
-
-
0034206518
-
Error-resilient coding in JPEG-2000 and MPEG-4
-
I. Moccagatta, S. Soudagar, J. Liang, and H. Chen, "Error-resilient coding in JPEG-2000 and MPEG-4," IEEE Journal on Selected Areas in Communications, 18(6):899-914, 2000
-
(2000)
IEEE Journal on Selected Areas in Communications
, vol.18
, Issue.6
, pp. 899-914
-
-
Moccagatta, I.1
Soudagar, S.2
Liang, J.3
Chen, H.4
-
29
-
-
0038005381
-
Error-resilient image and video transmission over the internet using unequal error protection
-
Joohee Kim, R.M. Mersereau, and Y. Altunbasak, "Error-resilient image and video transmission over the Internet using unequal error protection," IEEE Transactions on Image Processing, 12(2):121-131, 2003
-
(2003)
IEEE Transactions on Image Processing
, vol.12
, Issue.2
, pp. 121-131
-
-
Kim, J.1
Mersereau, R.M.2
Altunbasak, Y.3
-
31
-
-
0035278974
-
Multiple description coding using pairwise correlating transforms
-
Y. Wang, M. Orchard, V. Vaishampayan, and A. R. Reibman, "Multiple Description Coding using Pairwise Correlating Transforms," IEEE Transactions on Image Processing, 10:3(351-366), 2001.
-
(2001)
IEEE Transactions on Image Processing
, vol.10
, Issue.3
, pp. 351-366
-
-
Wang, Y.1
Orchard, M.2
Vaishampayan, V.3
Reibman, A.R.4
-
33
-
-
0033872149
-
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
-
M. Holliman, and N. Memon, "Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes," IEEE Transactions on Image Processing, 9(3):432-441, 2000
-
(2000)
IEEE Transactions on Image Processing
, vol.9
, Issue.3
, pp. 432-441
-
-
Holliman, M.1
Memon, N.2
-
34
-
-
0003309618
-
SDP: Session description protocol
-
M. Handley, and V. Jacobson, "SDP: Session Description Protocol," RFC 2327, 1998
-
(1998)
RFC 2327
-
-
Handley, M.1
Jacobson, V.2
-
35
-
-
0031122982
-
Effective erasure codes for reliable computer communication protocols
-
L. Rizzo, "Effective erasure codes for reliable computer communication protocols," ACM Computer Communication Review, 27, 1997.
-
(1997)
ACM Computer Communication Review
, pp. 27
-
-
Rizzo, L.1
-
36
-
-
0003195066
-
The MD5 message digest algorithm
-
R. Rivest, "The MD5 Message Digest Algorithm," RFC 1321, 1992
-
(1992)
RFC 1321
-
-
Rivest, R.1
-
37
-
-
0003629991
-
-
FIPS Publication 180-1
-
National Institute of Standards and Technology, "Secure Hash Standard (SHS)," FIPS Publication 180-1, 1995.
-
(1995)
Secure Hash Standard (SHS)
-
-
-
39
-
-
8344253818
-
-
Federal Information Processing Standards Publication (FIPS PUB) 180-2, Secure Hash Standard, 2002
-
(2002)
Secure Hash Standard
-
-
-
40
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. L. Rivest, A. Shamir, and L. M. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, Vol. 21, No. 2, pp. 120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
41
-
-
1542625912
-
-
RSA Cryptography Standard
-
RSA Labs, PKCS#1 v2/1, RSA Cryptography Standard, 2002
-
(2002)
PKCS#1 V2/1
-
-
-
42
-
-
0000758345
-
Proposed federal information processing standard for digital signature standard (DSS)
-
National Institute of Standards and Technology, "Proposed Federal Information Processing Standard for Digital Signature Standard (DSS)," Federal Register, Vol. 56, No. 169, pp. 42980-42982, 1991.
-
(1991)
Federal Register
, vol.56
, Issue.169
, pp. 42980-42982
-
-
-
43
-
-
0032677669
-
Measurement and modelling of the temporal dependence in packet loss
-
M. Yajnik, S. Moon, J. Kurose, and D. Towsley, "Measurement and modelling of the temporal dependence in packet loss," IEEE Infocom 1999.
-
(1999)
IEEE Infocom
-
-
Yajnik, M.1
Moon, S.2
Kurose, J.3
Towsley, D.4
|