Sign in

End-to-end security in the presence of intelligent data adapting proxies: the case of authenticating transcoded streaming media.

Craig GentryAlejandro HeviaRavi JainToshiro KawaharaZulfikar Ramzan
Published in: IEEE J. Sel. Areas Commun. (2005)
Keyphrases
  • end to end
  • data objects
  • network bandwidth
  • content delivery
  • location information
  • congestion control
  • streaming media