Zobrazeno 1 - 10
of 38
pro vyhledávání: '"Jaehoon Nah"'
Publikováno v:
ETRI Journal. 32:665-675
Recent research on mobile Internet protocol television and digital right management (DRM) interconnections has focused on multimedia technologies designed to enhance content scalability and adaptive content distribution. However, due to the architect
Publikováno v:
IEICE Transactions on Information and Systems. :1058-1073
Various advantages of cooperative peer-to-peer networks are strongly counterbalanced by the open nature of a distributed, serverless network. In such networks, it is relatively easy for an attacker to launch various attacks such as misrouting, corrup
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783642160653
CDVE
CDVE
Unlike a single-layer based media, maintaining data integrity of a scalable media (SVC-encoded media) constructed as multiple layers is more difficult to achieve due to a retransformation property of the scalable media. Moreover, media redistribution
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d5f09766be8749338f3d34dc638902f9
https://doi.org/10.1007/978-3-642-16066-0_15
https://doi.org/10.1007/978-3-642-16066-0_15
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783642113673
AP2PC
AP2PC
Building a good autonomous, self-organizing, and collaborating networks is an important research area for the design of large scale and high performance MultiAgent Systems on top of peer-to-peer (P2P) networks. This paper focuses on developing a mech
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::629603df61f6b1d8e8968e58c3ec7ead
https://doi.org/10.1007/978-3-642-11368-0_3
https://doi.org/10.1007/978-3-642-11368-0_3
Publikováno v:
2009 International Conference on New Trends in Information and Service Science.
Recently, there is the attempt to use overlay-based multicast, such as p2p, to distribute streaming media data for reducing network load and management cost. But there exist many security threats about overlay-based media multicast mechanism. In this
Publikováno v:
Information Security Applications ISBN: 9783642108372
WISA
WISA
In this paper, we present security mechanism to protect IPTV service network from malicious Rendezvous Point. The IPTV service network considered in this paper is overlay network that is constructed in application layer. The overlay-based IPTV servic
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c0a10089298fbc011eecba387553188d
https://doi.org/10.1007/978-3-642-10838-9_1
https://doi.org/10.1007/978-3-642-10838-9_1
Publikováno v:
2008 International Symposium on Ubiquitous Multimedia Computing.
A tractable and flexible job scheduling algorithm is very significant in HTC because most mission critical job tends to not only occupy resources for a long time but also demands fast completion as possible. Therefore with divisibility property of jo
Publikováno v:
2008 10th International Conference on Advanced Communication Technology.
This paper discusses how to identify Peer-to-Peer (P2P) traffic using a blind technique without observing individual payload in the proposed cooperation network model. Traditionally, the payload inspection based traffic identification methodologies h
Publikováno v:
Information Security Applications ISBN: 9783540710929
WISA
WISA
The characteristics of cooperative and trustworthy interaction in peer-to-peer overlay network are seriously challenged by the open nature of the network. The impact is particularly large when the identifiers of resource and peer are not verified bec
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f0c75ea1212a6409218a357fa2595c86
https://doi.org/10.1007/978-3-540-71093-6_22
https://doi.org/10.1007/978-3-540-71093-6_22
Publikováno v:
ICDCS Workshops
Many Internet applications use public key infrastructure (PKI) to enable the secure transaction of confidential messages. However, the use of PKI is not consistent with the ideas of peer-to-peer networks. In this paper, we propose public key manageme