Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
10341665 | Computers & Security | 2005 | 12 Pages |
Abstract
In this paper, we propose a hybrid hash-chaining scheme in conjunction with an adaptive and efficient data source authentication protocol which tolerates packet loss and guarantees non-repudiation of media-streaming origin. We have simulated our protocol using NS-2, and the simulation results show that the protocol has remarkable features and efficiency compared to other recent data source authentication protocols.
Keywords
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Yacine Challal, Abdelmadjid Bouabdallah, Hatem Bettahar,