{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T07:56:43Z","timestamp":1742975803102,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540309345"},{"type":"electronic","value":"9783540320999"}],"license":[{"start":{"date-parts":[[2005,1,1]],"date-time":"2005-01-01T00:00:00Z","timestamp":1104537600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11602897_33","type":"book-chapter","created":{"date-parts":[[2005,11,17]],"date-time":"2005-11-17T10:31:17Z","timestamp":1132223477000},"page":"389-401","source":"Crossref","is-referenced-by-count":3,"title":["Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 Stream"],"prefix":"10.1007","author":[{"given":"Tieyan","family":"Li","sequence":"first","affiliation":[]},{"given":"Huafei","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Yongdong","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"33_CR1","doi-asserted-by":"crossref","unstructured":"Smith, J.R., Mohan, R., Li, C.S.: Scalable Multimedia Delivery for Pervasive Computing. In: Proc. ACM Intl. Conf. on Multimedia (ACMM 1999), Orlando, FL (1999)","DOI":"10.1145\/319463.319480"},{"key":"33_CR2","unstructured":"Microsoft, Architecture of Windows Media Rights Manager, http:\/\/www.microsoft.com\/windows\/windowsmedia\/howto\/articles\/drmarchitecture.aspx"},{"key":"33_CR3","unstructured":"eXtensible right Markup Language (XrML), http:\/\/www.xrml.org"},{"key":"33_CR4","unstructured":"ISO\/IEC 14496-1:2001 Information Technology-Coding of Audio-Visual Objects-Part 1: Systems"},{"key":"33_CR5","unstructured":"ISO\/IEC 14496-2:2003 Information Technology-Coding of Audio-Visual Objects-Part 2: Visual"},{"issue":"3","key":"33_CR6","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1109\/76.911157","volume":"11","author":"W. Li","year":"2001","unstructured":"Li, W.: Overview of fine granularity scalability in MPEG-4 video standard. IEEE Trans. on Circuits and Systems for Video Technology\u00a011(3), 301\u2013317 (2001)","journal-title":"IEEE Trans. on Circuits and Systems for Video Technology"},{"issue":"6","key":"33_CR7","doi-asserted-by":"publisher","first-page":"819","DOI":"10.1109\/49.848236","volume":"18","author":"A.E. Mohr","year":"2000","unstructured":"Mohr, A.E., Riskin, E.A., Ladner, R.E.: Unequal loss protection: graceful degradation of image quality over packet erasure channels through forward error correction. IEEE Journal on Selected Areas in Communications\u00a018(6), 819\u2013828 (2000)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"33_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1007\/0-387-34805-0_21","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"R.C. Merkle","year":"1990","unstructured":"Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 218\u2013238. Springer, Heidelberg (1990)"},{"key":"33_CR9","doi-asserted-by":"crossref","unstructured":"Luby, M., Mitzenmacher, M., Shokrollahi, A., Spielman, D., Stemann, V.: Practical loss-resilient codes. In: Proc. 29th Annual ACM Symposium on Theory of Computing (STOC 1997), El Paso, TX (May 1997)","DOI":"10.1145\/258533.258573"},{"key":"33_CR10","doi-asserted-by":"crossref","unstructured":"Perrig, A., Canetti, R., Tygar, J.D., Song, D.: Efficient authentication and signature of multicast streams over lossy channels. In: Proceedings of the IEEE Symposium on Research in Security and Privacy (S&P 2000), May 2000, pp. 56\u201373 (2000)","DOI":"10.1109\/SECPRI.2000.848446"},{"key":"33_CR11","unstructured":"Golle, P., Modadugu, N.: Authenticated streamed data in the presernce of random packet loss. In: Proc. Network and Distributed System Security Symposium (NDSS 2001), San Diego, CA (February 2001)"},{"key":"33_CR12","doi-asserted-by":"crossref","unstructured":"Miner, S., Staddon, J.: Graph-based authentication of digital streams. In: Proceedings of the IEEE Symposium on Research in Security and Privacy (S&P 2001), May 2001, pp. 232\u2013246 (2001)","DOI":"10.1109\/SECPRI.2001.924301"},{"key":"33_CR13","unstructured":"Park, J.M., Chong, E.K., Siegel, H.J.: Efficient multicast packet authentication using signature amortization. In: Proceedings of the IEEE Symposium on Research in Security and Privacy (S&P 2002), May 2002, pp. 227\u2013240 (2002)"},{"issue":"2","key":"33_CR14","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1145\/762476.762480","volume":"6","author":"J.M. Park","year":"2003","unstructured":"Park, J.M., Chong, E., Siegel, H.J.: Efficient multicast packet authentication using erasure codes. ACM Transactions on Information and System Security (TISSEC 2003)\u00a06(2), 258\u2013285 (2003)","journal-title":"ACM Transactions on Information and System Security (TISSEC 2003)"},{"key":"33_CR15","unstructured":"Pannetrat, A., Molva, R.: Efficient multicast packet authentication. In: Proc. Network and Distributed System Security Symposium (NDSS 2003), San Diego, CA (February 2003)"},{"key":"33_CR16","unstructured":"Krohn, M.N., Freedman, M.J., Mazires, D.: On-the-Fly Verification of Rateless Erasure Codes for Efficient Content Distribution. In: IEEE Symposium on Security and Privacy (S&P 2004), California, USA (2004)"},{"key":"33_CR17","unstructured":"Karlof, C., Sastry, N., Li, Y., Perrig, A., Tygar, J.: Distillation codes and applications to DoS resistant multicast authentication. In: Proc. 11th Network and Distributed Systems Security Symposium (NDSS 2004), San Diego, CA (February 2004)"},{"key":"33_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-540-30191-2_7","volume-title":"Information and Communications Security","author":"T. Li","year":"2004","unstructured":"Li, T., Wu, Y., Ma, D., Zhu, H., Deng, R.H.: Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN. In: L\u00f3pez, J., Qing, S., Okamoto, E. (eds.) ICICS 2004. LNCS, vol.\u00a03269, pp. 79\u201391. Springer, Heidelberg (2004)"},{"key":"33_CR19","unstructured":"Suzuki, T., et al.: A system for end-to-end authentication of adaptive multimedia content. In: Eighth IFIP TC-6 TC-11 Conference on Communications and Multimedia Security (CMS 2004) (September 2004)"},{"key":"33_CR20","doi-asserted-by":"crossref","unstructured":"Gentry, C., Hevia, A., Jain, R., Kawahara, T., Ramzan, Z.: End-to-End Security in the Presence of Intelligent Data Adapting Proxies: the Case of Authenticating Transcoded Streaming Media. J. Selected Areas of Communication, Q1 (2005)","DOI":"10.1109\/JSAC.2004.839391"},{"key":"33_CR21","doi-asserted-by":"crossref","unstructured":"Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. In: EUROCRYPT 2003 (2003)","DOI":"10.1007\/3-540-39200-9_26"},{"key":"33_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1007\/978-3-540-24676-3_5","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"A. Lysyanskaya","year":"2004","unstructured":"Lysyanskaya, A., Micali, S., Reyzin, L., Shacham, H.: Sequential Aggregate Signatures from trapdoor one-way permutations. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 74\u201390. Springer, Heidelberg (2004)"},{"key":"33_CR23","doi-asserted-by":"crossref","unstructured":"Rogaway, P., Bellare, M., Black, J., Krovetz, T.: OCB: A block cipher mode of operation for efficient authenticated encryption. In: Proc. of 8th ACM CCS 2001 (2001)","DOI":"10.1145\/502010.502011"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11602897_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,5]],"date-time":"2025-01-05T18:03:26Z","timestamp":1736100206000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11602897_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540309345","9783540320999"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/11602897_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}