An Authentication Scheme in Peer-to-Peer Based Live Stream Sharing Management Systems.
Shiuh-Jeng WangYuh-Ren TsaiPin-You ChenPublished in: ISDA (1) (2008)
Keyphrases
- authentication scheme
- peer to peer
- management system
- file sharing
- data sharing
- streaming services
- smart card
- image encryption
- user authentication
- secret key
- data streams
- real time
- public key
- database management systems
- ad hoc networks
- authentication protocol
- security flaws
- distributed environment
- information sharing
- digital libraries
- security analysis
- video streaming
- image authentication
- cost effective
- feature extraction