User menu

Key management schemes for peer-to-peer multimedia streaming overlay networks

Bibliographic reference Naranjo, J.A.M. ; Lo pez-Ramos, J.A. ; Casado, L.G.. Key management schemes for peer-to-peer multimedia streaming overlay networks.Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks. Third IFIP WG11.2 International Workshop, WISTP 2009 (Brussels, Belgium, 1-4 September 2009). In: Markowitch, O.; Bilas, A.; Hoepman, J.-H.; Mitchell, C.J.; Quisquater, J.-J.;, Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks. Third IFIP WG11.2 International Workshop, WISTP 2009, Springer verlag2009, p. 128-142
Permanent URL http://hdl.handle.net/2078.1/67491
  1. Aciicmez Onur, Seifert Jean-Pierre, Zhang Xinwen, A Secure DVB Set-Top Box via Trusting Computing Technologies, 10.1109/ccnc.2009.4784777
  2. Balfe, S., Gallery, E., Mitchel, C., Paterson, K.: Challenges for trusted computing. In: Security & Privacy. IEEE, Los Alamitos (2008)
  3. Balfe S., Lakhani A.D., Paterson K.G., Trusted Computing: Providing Security for Peer-to-Peer Networks, 10.1109/p2p.2005.40
  4. Blahut Richard E., A Universal Reed-Solomon Decoder, 10.1147/rd.282.0150
  5. Eskicioglu Ahmet M., Multimedia security in group communications: recent progress in key management, authentication, and watermarking, 10.1007/s00530-003-0095-2
  6. Ganesh A.J., Kermarrec A.-M., Massoulie L., Peer-to-peer membership management for gossip-based protocols, 10.1109/tc.2003.1176982
  7. Huang Y.-L., Shieh S., Ho F.-S., Wang J.-C., Efficient Key Distribution Schemes for Secure Media Delivery in Pay-TV Systems, 10.1109/tmm.2004.834861
  8. International Teleommunication Union. ITU-R Rec. BT.810. Conditional-Access broadcasting systems (1992)
  9. Jelasity M., Montresor A., Epidemic-style proactive aggregation in large overlay networks, 10.1109/icdcs.2004.1281573
  10. Kostoulas, D., Psaltoulis, D., Gupta, I., Birman, K., Demers, A.: Decentralized schemes for size estimation in large and dynamic groups. In: NCA 2005: Proceedings of the Fourth IEEE International Symposium on Network Computing and Applications, pp. 41–48. IEEE Computer Society, Los Alamitos (2005)
  11. Le Merrer, E., Kermarrec, A.-M., Massoulie, L.: Peer to peer size estimation in large and dynamic networks: A comparative study, pp. 7–17 (2006)
  12. Lee, W.: Key distribution and management for conditional access system on DBS. In: Proc. of international conference on cryptology and information security, pp. 82–86 (1996)
  13. Liu, B., Zhang, W., Jiang, T.: A scalable key distribution scheme for conditional access system in digital pay-tv system. IEEE Transactions on Consumer Electronics 50(2) (2004)
  14. Liu, X., Yin, H., Lin, C., Deng, Y.: Efficient key management and distribution for peer-to-peer live streaming system, pp. 638–641 (2007)
  15. Liu Yong, Guo Yang, Liang Chao, A survey on peer-to-peer video streaming systems, 10.1007/s12083-007-0006-y
  16. Magharei N., Rejaie R., Guo Y., Mesh or Multiple-Tree: A Comparative Study of Live P2P Streaming Approaches, 10.1109/infcom.2007.168
  17. Massoulié Laurent, Le Merrer Erwan, Kermarrec Anne-Marie, Ganesh Ayalvadi, Peer counting and sampling in overlay networks : random walk methods, 10.1145/1146381.1146402
  18. McEliece R. J., Sarwate D. V., On sharing secrets and Reed-Solomon codes, 10.1145/358746.358762
  19. Menezes, A.J., Oorschot, P.C.V., Vanstone, S.A., Rivest, R.L.: Handbook of applied cryptography (1997)
  20. Qiu Feng, Lin Chuang, Yin Hao, EKM: An Efficient Key Management Scheme for Large-Scale Peer-to-Peer Media Streaming, Advances in Multimedia Information Processing - PCM 2006 (2006) ISBN:9783540487661 p.395-404, 10.1007/11922162_46
  21. Schneier, B.: Practical Cryptography. Wiley & Sons, Chichester (2003)
  22. Fu-Kuan Tu, Chi-Sung Laih, Hsu-Hung Tung, On key distribution management for conditional access system on pay-TV system, 10.1109/30.754430
  23. der Veen Michiel van, Lemma Aweke Negash, Kalker Ton, Electronic content delivery and forensic watermarking, 10.1007/s00530-005-0200-9