By Topic

An Efficient Source Authentication for Multicast Based on Merkle Hash Tree

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Iuon-Chang Lin ; Dept. of Manage. Inf. Syst., Nat. Chung Hsing Univ., Taichung, Taiwan ; Chia-Chang Sung

Source authentication is necessary in many multicast applications, especially in the real-time applications such as stream-video and online-news. In these applications, we should assure that all the packets received are from the same legal source and this can be done efficiently. In this paper, we propose an efficient scheme to decrease both communication cost and computation cost of source authentication. Owing to packets may arrive in an irregular sequence, so we consider checking its real order of content. After all, there are some analyses about comparing the efficiency and costs with other researches.

Published in:

Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2010 Sixth International Conference on

Date of Conference:

15-17 Oct. 2010