Article ID Journal Published Year Pages File Type
10341665 Computers & Security 2005 12 Pages PDF
Abstract
In this paper, we propose a hybrid hash-chaining scheme in conjunction with an adaptive and efficient data source authentication protocol which tolerates packet loss and guarantees non-repudiation of media-streaming origin. We have simulated our protocol using NS-2, and the simulation results show that the protocol has remarkable features and efficiency compared to other recent data source authentication protocols.
Related Topics
Physical Sciences and Engineering Computer Science Computer Networks and Communications
Authors
, , ,