Adopting Redundancy Techniques for Multicast Stream Authentication.
Tommaso CucinottaGabriele CecchettiGianluca FerraroPublished in: FTDCS (2003)
Keyphrases
- data streams
- sliding window
- wireless networks
- multiple description coding
- real time
- user authentication
- wireless ad hoc networks
- multicast routing
- streaming data
- overlay network
- network coding
- biometric authentication
- group membership
- image authentication
- identity management
- route selection
- web services
- congestion control
- application layer
- authentication protocol
- content delivery
- security analysis
- end to end
- authentication scheme
- end to end delay
- multicast tree
- inter domain
- routing algorithm
- ad hoc networks
- authentication mechanism
- factor authentication
- fragile watermarking