{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T05:34:16Z","timestamp":1740548056208,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540235637"},{"type":"electronic","value":"9783540301912"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30191-2_7","type":"book-chapter","created":{"date-parts":[[2010,9,22]],"date-time":"2010-09-22T20:14:16Z","timestamp":1285186456000},"page":"79-91","source":"Crossref","is-referenced-by-count":5,"title":["Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN"],"prefix":"10.1007","author":[{"given":"Tieyan","family":"Li","sequence":"first","affiliation":[]},{"given":"Yongdong","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Di","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Huafei","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Robert H.","family":"Deng","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","unstructured":"ISO\/IEC 14496-1:2001 Information Technology - Coding of Audio-Visual Objects- Part 1: Systems"},{"key":"7_CR2","unstructured":"ISO\/IEC 14496-2:2003 Information Technology - Coding of Audio-Visual Objects- Part 2: Visual"},{"issue":"3","key":"7_CR3","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1109\/76.911157","volume":"11","author":"W. Li","year":"2001","unstructured":"Li, W.: Overview of fine granularity scalability in MPEG-4 video standard. IEEE Trans. on Circuits and Systems for Video Technology\u00a011(3), 301\u2013317 (2001)","journal-title":"IEEE Trans. on Circuits and Systems for Video Technology"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Kuhne, G., Kuhmnch, C.: Transmitting MPEG-4 Video Streams over the Internet: Problems and Solutions. ACM Multimedia (1999)","DOI":"10.1145\/319878.319914"},{"key":"7_CR5","unstructured":"Chia, C.H., Beg, M.S.: MPEG-4 video transmission over bluetooth links. In: IEEE International Conference on Personal Wireless Communications, pp. 280\u2013284 (2002)"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Ikkurthy, P., Labrador, M.A.: Characterization of MPEG-4 traffic over IEEE 802.11b wireless LANs. In: 27th Annual IEEE Conference on Local Computer Networks, pp. 421\u2013427 (2002)","DOI":"10.1109\/LCN.2002.1181814"},{"issue":"6","key":"7_CR7","doi-asserted-by":"publisher","first-page":"819","DOI":"10.1109\/49.848236","volume":"18","author":"A.E. Mohr","year":"2000","unstructured":"Mohr, A.E., Riskin, E.A., Ladner, R.E.: Unequal loss protection: graceful degradation of image quality over packet erasure channels through forward error correction. IEEE Journal on Selected Areas in Communications\u00a018(6), 819\u2013828 (2000)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"7_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1007\/0-387-34805-0_21","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"R.C. Merkle","year":"1990","unstructured":"Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 218\u2013238. Springer, Heidelberg (1990)"},{"key":"7_CR9","unstructured":"Jonathan Robbins RTT and Loss vs. Packet Size and Bitrate, http:\/\/www.cs.unc.edu\/~robbins\/comp249\/HW3\/"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Saroui, S., Gummadi, K.P., Dunn, R.J., Gribble, S.D., Levy, H.M.: An analysis of Internet content delivery systems. In: Proc. 5th Symposium on Operating Systems Design and Implementation (OSDI), Boston, MA (October 2002)","DOI":"10.1145\/1060289.1060319"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Luby, M., Mitzenmacher, M., Shokrollahi, A., Spielman, D., Stemann, V.: Practical loss-resilient codes. In: Proc. 29th Annual ACM Symposium on Theory of Computing (STOC), El Paso, TX (May 1997)","DOI":"10.1145\/258533.258573"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Castro, M., Druschel, P., Kermarrec, A., Nandi, A., Rowstron, A., Singh, A.: Splitstream: High-bandwidth multicast in a cooperative environment. In: Proc. 18th ACM symposiom on operating systems principles (SOSP), NY (October 2003)","DOI":"10.1145\/945445.945474"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Padmanabhan, V.N., Wang, H.J., Chou, P.A.: Resilient Peer-to-Peer Streaming. In: IEEE ICNP 2003, Atlanta, GA, USA (November 2003)","DOI":"10.1109\/ICNP.2003.1249753"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., Pinkas, B.: Multicast security: A taxonomy and some efficient constructions. In: Proc. IEEE INFOCOM 1999, New York, NY (1999)","DOI":"10.1109\/INFCOM.1999.751457"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Gennaro, R., Rohatgi, P.: How to sign digital streams. In: Advances in Cryptology-CRYPTO 1997, Santa Barbara, CA (August 1997)","DOI":"10.1007\/BFb0052235"},{"key":"7_CR16","unstructured":"Wong, C.K., Lam, S.S.: Digital signatures for flows and multicasts. In: Proc. IEEE International Conference on Network Protocols, Austin, TX (October 1998)"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Rohatgi, P.: A compact and fast hybrid signature scheme for multicast packet authentication. In: Proc. 6th ACM Conference on Computer and Communication Security (CCS), Singapore (November 1999)","DOI":"10.1145\/319709.319722"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Perrig, A., Canetti, R., Tygar, J.D., Song, D.: Efficient authentication and signature of multicast streams over lossy channels. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, May 2000, pp. 56\u201373 (2000)","DOI":"10.1109\/SECPRI.2000.848446"},{"key":"7_CR19","first-page":"35","volume-title":"Proceedings of the Symposium on Network and Distributed Systems Security (NDSS 2001)","author":"A. Perrig","year":"2001","unstructured":"Perrig, A., Canetti, R., Song, D., Tygar, J.D.: Efficient and secure source authentication for multicast. In: Proceedings of the Symposium on Network and Distributed Systems Security (NDSS 2001), February 2001, pp. 35\u201346. Internet Society, San Diego (2001)"},{"key":"7_CR20","unstructured":"Golle, P., Modadugu, N.: Authenticated streamed data in the presernce of random packet loss. In: Proc. NDSS 2001, San Diego, CA (2001)"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Miner, S., Staddon, J.: Graph-based authentication of digital streams. In: IEEE S&P 2001, pp. 232\u2013246 (2001)","DOI":"10.1109\/SECPRI.2001.924301"},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"Perrig, A.: The BiBa one-time signature and broadcast authentication protocol. In: Proceedings of the Eighth ACM Conference on Computer and Communications Security (CCS-8), Philadelphia PA, USA, November 2001, pp. 28\u201337 (2001)","DOI":"10.1145\/501983.501988"},{"key":"7_CR23","unstructured":"Park, J.M., Chong, E.K., Siegel, H.J.: Efficient multicast packet authentication using signature amortization. In: IEEE S&P 2002, pp. 227\u2013240 (2002)"},{"key":"7_CR24","unstructured":"Pannetrat, A., Molva, R.: Efficient multicast packet authentication. In: Proc. NDSS 2003, San Diego, CA (2003)"},{"key":"7_CR25","doi-asserted-by":"crossref","unstructured":"Krohn, M.N., Freedman, M.J., Mazires, D.: On-the-Fly Verification of Rateless Erasure Codes for Efficient Content Distribution. In: IEEE S&P 2004, California, USA (2004)","DOI":"10.1109\/SECPRI.2004.1301326"},{"key":"7_CR26","unstructured":"Karlof, C., Sastry, N., Li, Y., Perrig, A., Tygar, J.: Distillation codes and applications to DoS resistant multicast authentication. In: Proc. NDSS 2004, San Diego, CA (February 2004)"},{"key":"7_CR27","doi-asserted-by":"crossref","unstructured":"Lysyanskaya, A., Tamassia, R., Triandopoulos, N.: Multicast Authentication in Fully Adversarial Networks. In: IEEE S&P 2004, California, USA (2004)","DOI":"10.1109\/SECPRI.2004.1301327"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30191-2_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T00:21:28Z","timestamp":1740529288000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30191-2_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540235637","9783540301912"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30191-2_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}