The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Peer-to-peer networks such as Bit Torrent swarms have gained popularity on Internet. One of the fundamental underlying mechanisms is to foster and enforce peer cooperativeness. As for fairly exchanging Bit Torrent chunks, peers may resort to encrypted chunk exchanges yet at the cost of delayed availability of plain chunks. In response, this paper presents a chunk encryption scheme for exchanging chunks...
In this issue's Works-In-Progress department has three entries. The first is a request for community participation in a survey on indoor positioning systems for interactive, locative audio applications. The second entry presents a decentralized, peer-to-peer-based approach to cloud file sharing with encryption and data de-duplication. The final entry proposes an architecture for augmenting objects...
The number and popularity of applications developed over the Peer-to-Peer (P2P) network paradigm has been growing over the last decade, some of which are dedicated to streaming multimedia content. To deceive traffic shaping mechanisms or improve the security of the communications, these applications generate encrypted traffic or resort to several obfuscation techniques, making it difficult to manage...
A peer-to-peer (P2P) architecture for video conferencing has great prospects for development. The security of the system, however, poses a set of significant challenges. In order to ensure the transmission security of the information of the video conferencing system P2P-based, in this paper, we report a set of new security architecture, and establish the corresponding security management strategy...
This work concentrates on the design of an efficient and scalable group rekey method for P2P IPTV DRM system where the minimal division of right is a program. Our group rekey scheme is efficient in two aspects, less number of encryption and less individual transmission. We divide the members into three categories, namely, the fresh members, the rejoined members, and the remaining members, according...
The purpose of this article is to discuss an authentication method for peer to peer (P2P)-based streaming media. Methods of encryption of streaming media data and digital signatures were used to improve the safety of the media. The digital certificate publishing service and management services of live streaming media authentication information are expanded in the live stream system based on P2P networks...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.