-
3
-
-
0041521019
-
Internet delivery of MPEG-4 object-based multimedia
-
Jul.-Sep.
-
Y. Pourmohammadi-Fallah, K. Asrar-Haghighi, and H. Alnuweiri, "Internet delivery of MPEG-4 object-based multimedia," IEEE Multimedia, vol. 10, no. 3, pp. 68-78, Jul.-Sep. 2003.
-
(2003)
IEEE Multimedia
, vol.10
, Issue.3
, pp. 68-78
-
-
Pourmohammadi-Fallah, Y.1
Asrar-Haghighi, K.2
Alnuweiri, H.3
-
4
-
-
0035279159
-
Overview of fine granularity scalability in MPEG-4 video standard
-
Mar.
-
W. Li, "Overview of fine granularity scalability in MPEG-4 video standard," IEEE Trans. Circuits Syst. Video Technol., vol. 11, no. 3, pp. 301-317, Mar. 2001.
-
(2001)
IEEE Trans. Circuits Syst. Video Technol.
, vol.11
, Issue.3
, pp. 301-317
-
-
Li, W.1
-
8
-
-
31344478360
-
Transmitting MPEG-4 video streams over the internet: Problems and solutions
-
G. Kuhne and C. Kuhmnch, "Transmitting MPEG-4 video streams over the internet: Problems and solutions," ACM Multimedia, 1999.
-
(1999)
ACM Multimedia
-
-
Kuhne, G.1
Kuhmnch, C.2
-
9
-
-
84880901653
-
The order of encryption and authentication for protecting communications (or: How secure is SSL?)
-
H. Krawczyk, "The order of encryption and authentication for protecting communications (or: How secure is SSL?)," in Proc. CRYPTO'2001, vol. LNCS 2139, pp. 310-331.
-
Proc. CRYPTO'2001
, vol.LNCS 2139
, pp. 310-331
-
-
Krawczyk, H.1
-
10
-
-
0004044627
-
IP Encapsulating Security Payload (ESP)
-
[Online]
-
S. Kent. (2003) IP Encapsulating Security Payload (ESP), Internet Draft. [Online]. Available: http://www.ietf.org/internet-drafts/draft-ietf-ipsec-esp-v3-06.txt
-
(2003)
Internet Draft
-
-
Kent, S.1
-
12
-
-
0037745868
-
Efficient and fully scalable encryption for MPEG-4 FGS
-
C. Yuan, B. D. Zhu, Y. Wong, S. Li, and Y. Zhong, "Efficient and fully scalable encryption for MPEG-4 FGS," in Proc, Int. Symp. Circuits and Systems (ISCAS), 2003, pp. II620-623.
-
(2003)
Proc, Int. Symp. Circuits and Systems (ISCAS)
-
-
Yuan, C.1
Zhu, B.D.2
Wong, Y.3
Li, S.4
Zhong, Y.5
-
13
-
-
2342565737
-
Securing media for adaptive streaming
-
C. Venkatramani, P. Westerink, O. Vercheure, and P. Frossard, "Securing media for adaptive streaming," ACM Multimedia, pp. 307-310, 2003.
-
(2003)
ACM Multimedia
, pp. 307-310
-
-
Venkatramani, C.1
Westerink, P.2
Vercheure, O.3
Frossard, P.4
-
14
-
-
33744979306
-
-
[Online]
-
Crypto++ 5.2.1 Benchmarks. [Online]. Available: http://www.eskimo.com/~weidai/benchmarks.html
-
Crypto++ 5.2.1 Benchmarks
-
-
-
16
-
-
1542625909
-
Efficient multicast stream authentication using erasure codes
-
J. M. Park, E. K. Chong, and H. J. Siegel, "Efficient multicast stream authentication using erasure codes," ACM Trans. Inform. and Syst. Security, vol. 6, no. 2, pp. 258-285, 2003.
-
(2003)
ACM Trans. Inform. and Syst. Security
, vol.6
, Issue.2
, pp. 258-285
-
-
Park, J.M.1
Chong, E.K.2
Siegel, H.J.3
-
18
-
-
1542753484
-
Content-aware authentication of motion JPEG2000 stream in lossy networks
-
Y. Wu and R. H. Deng, "Content-aware authentication of motion JPEG2000 stream in lossy networks," IEEE Trans. Consumer Electron., vol. 49, no. 4, pp. 792-801, 2003.
-
(2003)
IEEE Trans. Consumer Electron.
, vol.49
, Issue.4
, pp. 792-801
-
-
Wu, Y.1
Deng, R.H.2
-
19
-
-
84889351757
-
How to sign digital streams
-
R. Gennaro and R. Rohatgi, "How to sign digital streams," in Proc. CRYPTO'97, LNCS 1294, pp. 180-197.
-
Proc. CRYPTO'97
, vol.LNCS 1294
, pp. 180-197
-
-
Gennaro, R.1
Rohatgi, R.2
-
21
-
-
0033690336
-
Efficient authentication and signature of multicast streams over lossy channels
-
A. Perrig, R. Canetti, D. Tygar, and D. Song, "Efficient authentication and signature of multicast streams over lossy channels," in Proc. IEEE Symp. Security and Privacy, 2000.
-
(2000)
Proc. IEEE Symp. Security and Privacy
-
-
Perrig, A.1
Canetti, R.2
Tygar, D.3
Song, D.4
-
22
-
-
35048891868
-
Keying hash functions for message authentication
-
M. Bellare, R. Canetti, and H. Krawczyk, "Keying hash functions for message authentication," in Proc. CRYPTO'96, vol. LNCS 1109, 1996, pp. 1-15.
-
(1996)
Proc. CRYPTO'96
, vol.LNCS 1109
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
23
-
-
0033280006
-
A compact and fast hybrid signature scheme for multicast packet authentication
-
P. Rohatgi, "A compact and fast hybrid signature scheme for multicast packet authentication," in Proc. 6th ACM Conf. Computer and Communication Security, 1999, pp. 93-100.
-
(1999)
Proc. 6th ACM Conf. Computer and Communication Security
, pp. 93-100
-
-
Rohatgi, P.1
-
24
-
-
15744368857
-
Efficient and secure source authentication for multicast
-
San Diego, CA, Feb.
-
A. Perrig, R. Canetti, D. Tygar, and D. Song, "Efficient and secure source authentication for multicast," in Proc. NDSS, San Diego, CA, Feb. 2001.
-
(2001)
Proc. NDSS
-
-
Perrig, A.1
Canetti, R.2
Tygar, D.3
Song, D.4
-
25
-
-
85180799647
-
Authenticating streamed data in the presence of random packet loss
-
San Diego, CA, Feb.
-
P. Golle and N. Modadugu, "Authenticating streamed data in the presence of random packet loss," in Proc. NDSS, San Diego, CA, Feb. 2001.
-
(2001)
Proc. NDSS
-
-
Golle, P.1
Modadugu, N.2
-
26
-
-
84974694679
-
Efficient object-based stream authentication
-
Y. Wu, D. Ma, and C. Xu, "Efficient object-based stream authentication," in Proc. Indocrypto 2002, vol. LNCS 2551, pp. 354-367.
-
Proc. Indocrypto 2002
, vol.LNCS 2551
, pp. 354-367
-
-
Wu, Y.1
Ma, D.2
Xu, C.3
-
29
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. L. Rivest, A. Shamir, and L. M. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, vol. 21, no. 2, pp. 120-126, 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
30
-
-
0000758345
-
Proposed federal information processing standard for digital signature standard (DSS)
-
"Proposed federal information processing standard for digital signature standard (DSS)," Federal Register, vol. 56, no. 169, pp. 42 980-42 982, 1991.
-
(1991)
Federal Register
, vol.56
, Issue.169
, pp. 42980-42982
-
-
-
31
-
-
2342472595
-
A flexible and scalable authentication scheme for JPEG2000 codestreams
-
C. Peng, R. H. Deng, Y. Wu, and W. Shao, "A flexible and scalable authentication scheme for JPEG2000 codestreams," ACM Multimedia, pp. 433-441, 2003.
-
(2003)
ACM Multimedia
, pp. 433-441
-
-
Peng, C.1
Deng, R.H.2
Wu, Y.3
Shao, W.4
-
32
-
-
0035748036
-
Flexible authentication of xml documents
-
P. Devanbu, M. Gertz, A. Kwong, C. Martel, G. Nuckolls, and G. Stubblebine, "Flexible authentication of xml documents," in Proc. 8th ACM Conf. Computer and Communication Security, 2001, pp. 136-145.
-
(2001)
Proc. 8th ACM Conf. Computer and Communication Security
, pp. 136-145
-
-
Devanbu, P.1
Gertz, M.2
Kwong, A.3
Martel, C.4
Nuckolls, G.5
Stubblebine, G.6
-
34
-
-
77958484856
-
Authentic third-party data publication
-
P. Devanbu, M. Gertz, C. Martel, and S. Stubblebine, "Authentic third-party data publication," in Proc. 14th IFIP WG11.3 Working Conf. Database Security, vol. 201, 2001, pp. 101-112.
-
(2001)
Proc. 14th IFIP WG11.3 Working Conf. Database Security
, vol.201
, pp. 101-112
-
-
Devanbu, P.1
Gertz, M.2
Martel, C.3
Stubblebine, S.4
-
36
-
-
84969346266
-
A certified digital signature
-
Lecture Notes on Computer Science
-
R. C. Merkle, "A certified digital signature," in Proc. Crypto'89, vol. 0435, Lecture Notes on Computer Science, 1989, pp. 218-238.
-
(1989)
Proc. Crypto'89
, vol.435
, pp. 218-238
-
-
Merkle, R.C.1
-
38
-
-
0031122982
-
Effective erasure codes for reliable computer communication protocols
-
L. Rizzo, "Effective erasure codes for reliable computer communication protocols," ACM Comput. Commun. Rev., vol. 27, 1997.
-
(1997)
ACM Comput. Commun. Rev.
, vol.27
-
-
Rizzo, L.1
-
40
-
-
0036054102
-
Packet loss resilience for MPEG-4 video stream over the internet
-
J.-Y. Pyun, J.-H. Jung, J.-J. Shim, S.-J. Ko, and S.-H. Park, "Packet loss resilience for MPEG-4 video stream over the internet," in Proc. Int. Conf. Consumer Electronics, 2002, pp. 164-165.
-
(2002)
Proc. Int. Conf. Consumer Electronics
, pp. 164-165
-
-
Pyun, J.-Y.1
Jung, J.-H.2
Shim, J.-J.3
Ko, S.-J.4
Park, S.-H.5
-
41
-
-
0038421868
-
Unequal packet loss resilience for MPEG-4 video over the internet
-
X. K. Yang, C. Zhu, Z. G. Li, X. Lin, and N. Ling, "Unequal packet loss resilience for MPEG-4 video over the internet," in Proc. Int. Symp. Circuits and Systems, 2003, pp. II 832-835.
-
(2003)
Proc. Int. Symp. Circuits and Systems
-
-
Yang, X.K.1
Zhu, C.2
Li, Z.G.3
Lin, X.4
Ling, N.5
-
42
-
-
0036049725
-
MPEG-4 video streaming over unstable broadband network environment
-
I. Andoh, H. Takehara, H. Nakamura, B. Lan, and H. C. Chih, "MPEG-4 video streaming over unstable broadband network environment," in Proc. Int. Conf. Consumer Electronics, 2002, pp. 280-281.
-
(2002)
Proc. Int. Conf. Consumer Electronics
, pp. 280-281
-
-
Andoh, I.1
Takehara, H.2
Nakamura, H.3
Lan, B.4
Chih, H.C.5
-
43
-
-
0034205048
-
Unequal loss protection: Graceful degradation of image quality over packet erasure channels through forward error correction
-
Jun.
-
A. E. Mohr, E. A. Riskin, and R. E. Ladner, "Unequal loss protection: Graceful degradation of image quality over packet erasure channels through forward error correction," IEEE J. Select. Areas Commun., vol. 18, no. 6, pp. 819-828, Jun. 2000.
-
(2000)
IEEE J. Select. Areas Commun.
, vol.18
, Issue.6
, pp. 819-828
-
-
Mohr, A.E.1
Riskin, E.A.2
Ladner, R.E.3
-
45
-
-
84957364590
-
A new paradigm for collision-free hashing: Incrementality at reduced cost
-
M. Bellare and D. Micciancio, "A new paradigm for collision-free hashing: Incrementality at reduced cost," in Proc. EUROCRYPT97, vol. LNCS 1233, 1997, pp. 163-192.
-
(1997)
Proc. EUROCRYPT97
, vol.LNCS 1233
, pp. 163-192
-
-
Bellare, M.1
Micciancio, D.2
-
46
-
-
0033872149
-
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
-
Mar.
-
M. Holliman and N. Memon, "Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes," IEEE Trans. Image Process., vol. 9, no. 3, pp. 432-441, Mar. 2000.
-
(2000)
IEEE Trans. Image Process.
, vol.9
, Issue.3
, pp. 432-441
-
-
Holliman, M.1
Memon, N.2
-
47
-
-
84945279475
-
An efficient dynamic and distributed cryptographic accumulator
-
M. T. Goodrich, R. Tamassia, and J. Hasic, "An efficient dynamic and distributed cryptographic accumulator," in Proc. ISC2002, vol. LNCS 2433, pp. 372-388.
-
Proc. ISC2002
, vol.2433
, pp. 372-388
-
-
Goodrich, M.T.1
Tamassia, R.2
Hasic, J.3
-
48
-
-
0032677669
-
Measurement and modeling of the temporal dependence in packet loss
-
New York
-
M. Yajnik, S. Moon, J. Kurose, and D. Towsley, "Measurement and modeling of the temporal dependence in packet loss," in Proc. IEEE Infocom 1999, New York.
-
Proc. IEEE Infocom 1999
-
-
Yajnik, M.1
Moon, S.2
Kurose, J.3
Towsley, D.4
|