메뉴 건너뛰기




Volumn , Issue , 2006, Pages 62-

Multimedia content authentication for proxy-side adaptation

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; MULTIMEDIA SERVICES;

EID: 40849137797     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDT.2006.50     Document Type: Conference Paper
Times cited : (10)

References (24)
  • 3
    • 40849148256 scopus 로고    scopus 로고
    • P. Bellavista and A. Corradi. A mobile agent-activated middleware for internet video on demand. IPSJ Journal, 43(11):33013315, November 2002.
    • P. Bellavista and A. Corradi. A mobile agent-activated middleware for internet video on demand. IPSJ Journal, 43(11):33013315, November 2002.
  • 5
    • 0032138638 scopus 로고    scopus 로고
    • A. Fox, S.Gribble, Y.Chawathe, and E.Brewer. Adapting to network and client variation using active proxies: Lessons and perspectives. Special issue of IEEE Personal Communications on Adapation, 5(4), August 1998.
    • A. Fox, S.Gribble, Y.Chawathe, and E.Brewer. Adapting to network and client variation using active proxies: Lessons and perspectives. Special issue of IEEE Personal Communications on Adapation, 5(4), August 1998.
  • 6
    • 40849133484 scopus 로고    scopus 로고
    • A RTP to HTTP video gateway
    • M. Johanson. A RTP to HTTP video gateway. World Wide Web, pages 499503, 2001.
    • (2001) World Wide Web , pp. 499503
    • Johanson, M.1
  • 11
    • 0005097206 scopus 로고    scopus 로고
    • Digital Rights Management (DRM) Architectures
    • June
    • R. Iannella, Digital Rights Management (DRM) Architectures, D-Lib Magazine, vol. 7, no. 6, June 2001.
    • (2001) D-Lib Magazine , vol.7 , Issue.6
    • Iannella, R.1
  • 12
    • 0037399649 scopus 로고    scopus 로고
    • Security of Digital Entertainment Content from Creation to Consumption
    • A. M. Eskicioglu, J. Town, and E. J. Delp, Security of Digital Entertainment Content from Creation to Consumption, Signal Processing: Image Communication, Special Issue on Image Security, vol. 18, no. 4, pp. 237 262, 2003.
    • (2003) Signal Processing: Image Communication , vol.18 , Issue.4 , pp. 237-262
    • Eskicioglu, A.M.1    Town, J.2    Delp, E.J.3
  • 13
    • 40849141666 scopus 로고    scopus 로고
    • WG11 13818-11:2003(E), Information Technology Generic Coding of Moving Pictures and Associated Audio Information Part 11: IPMP on MPEG-2 Systems,
    • ISO/IEC JTC1/SC29
    • ISO/IEC JTC1/SC29/WG11 13818-11:2003(E), Information Technology Generic Coding of Moving Pictures and Associated Audio Information Part 11: IPMP on MPEG-2 Systems, 2003.
    • (2003)
  • 14
    • 40849125177 scopus 로고    scopus 로고
    • WG11 14496-13:2004(E), Information Technology Coding of Audio-Visual Object Part 13: Intellectual Property Management and Protection (IPMP) Extensions,
    • ISO/IEC JTC1/SC29
    • ISO/IEC JTC1/SC29/WG11 14496-13:2004(E), Information Technology Coding of Audio-Visual Object Part 13: Intellectual Property Management and Protection (IPMP) Extensions, 2004.
    • (2004)
  • 15
    • 40849099612 scopus 로고    scopus 로고
    • Open Mobile Alliance, OMA DRM Specification Draft Version 2.0, March 2004. http://www.openmobilealliance.org
    • Open Mobile Alliance, OMA DRM Specification Draft Version 2.0, March 2004. http://www.openmobilealliance.org
  • 17
    • 40849097092 scopus 로고    scopus 로고
    • http://www.intertrust.com/main/overview/drm.html
  • 19
    • 40849107527 scopus 로고    scopus 로고
    • RealNetworks: Helix DRM, http://www.realnetworks.com/products/drm/index. html
    • Helix DRM
  • 20
    • 85056395691 scopus 로고    scopus 로고
    • B. Furht and D. Kirovski, Eds, CRC Press, to be published in
    • B. Furht and D. Kirovski, Eds. Multimedia Security Handbook, CRC Press, to be published in 2004.
    • (2004) Multimedia Security Handbook
  • 21
    • 13844298431 scopus 로고    scopus 로고
    • C. Gentry, A. Hevia, R. Jain, T. Kawahara, and Z. Ramzan. End-to-End Security in the Presence of Intelligent Data Adapting Proxies: the Case of Authenticating Transcoded Streaming Media. J. Selected Areas of Communication, Q1, 2005.
    • C. Gentry, A. Hevia, R. Jain, T. Kawahara, and Z. Ramzan. End-to-End Security in the Presence of Intelligent Data Adapting Proxies: the Case of Authenticating Transcoded Streaming Media. J. Selected Areas of Communication, Q1, 2005.
  • 22
    • 35048904588 scopus 로고    scopus 로고
    • Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN
    • 6th International Conference on Information and Communications Security ICICS04, Spain
    • Tieyan Li, Yongdong Wu, Di Ma, Huafei Zhu, Robert H. Deng, Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN, 6th International Conference on Information and Communications Security (ICICS04), LNCS 3269, Spain, 2004.
    • (2004) LNCS , vol.3269
    • Li, T.1    Wu, Y.2    Ma, D.3    Zhu, H.4    Deng, R.H.5
  • 24
    • 84969346266 scopus 로고
    • A certified digital signature
    • G. Brassard, editor, Advances in Cryptology, CRYPTO89, Springer-Verlag Berlin Heidelberg
    • C. R. Merkle, A certified digital signature. In G. Brassard, editor, Advances in Cryptology - CRYPTO89 LNCS, volume 435. Springer-Verlag Berlin Heidelberg 1990, 1990.
    • (1990) LNCS , vol.435
    • Merkle, C.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.