{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T23:10:31Z","timestamp":1737069031341,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540721598"},{"type":"electronic","value":"9783540721635"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-72163-5_22","type":"book-chapter","created":{"date-parts":[[2007,6,5]],"date-time":"2007-06-05T09:27:19Z","timestamp":1181035639000},"page":"284-300","source":"Crossref","is-referenced-by-count":1,"title":["Achieving End-to-End Authentication in Intermediary-Enabled Multimedia Delivery Systems"],"prefix":"10.1007","author":[{"given":"Robert H.","family":"Deng","sequence":"first","affiliation":[]},{"given":"Yanjiang","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/11555827_10","volume-title":"Computer Security \u2013 ESORICS 2005","author":"G. Ateniese","year":"2005","unstructured":"Ateniese, G., et al.: Sanitizable Signatures. In: de Capitani di Vimercati, S., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol.\u00a03679, pp. 159\u2013177. Springer, Heidelberg (2005)"},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. In: ACM, Computer and Communication Security, pp. 62\u201373 (1993)","DOI":"10.1145\/168588.168596"},{"key":"22_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/11761679_11","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"S. Contini","year":"2006","unstructured":"Contini, S., Lenstra, A.K., Steinfeld, R.: VSH, an Efficient and Provable Collision Resistant Hash Function. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol.\u00a04004, pp. 165\u2013182. Springer, Heidelberg (2006)"},{"issue":"1","key":"22_CR4","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/s00530-005-0190-7","volume":"11","author":"R.H. Deng","year":"2005","unstructured":"Deng, R.H., et al.: Scalable Trusted Online Dissemination of JPEG2000 Images. ACM Multimedia Systems\u00a011(1), 60\u201367 (2005)","journal-title":"ACM Multimedia Systems"},{"key":"22_CR5","volume-title":"Security in the 21st Century","author":"R.H. Deng","year":"2004","unstructured":"Deng, R.H., Wu, Y., Ma, D.: Securing JPEG2000 code-streams. In: Security in the 21st Century, Springer, Heidelberg (2004)"},{"issue":"2","key":"22_CR6","doi-asserted-by":"publisher","first-page":"464","DOI":"10.1109\/JSAC.2004.839391","volume":"23","author":"C. Gentry","year":"2005","unstructured":"Gentry, C., Hevia, A., Jain, R.: End-to-End Security in the Presence of Intelligent Data Adapting Proxies: The Case of Authenticating Transcoded Streaming Media. IEEE Journal on Selected Areas in Communications\u00a023(2), 464\u2013473 (2005)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"22_CR7","unstructured":"Golle, P., Modadugu, N.: Authenticated Streamed Data in the Presence of Random Packet Loss. In: Network and Distributed System Security Symposium, NDSS\u201901 (2001)"},{"key":"22_CR8","unstructured":"Huang, J.L., Chen, M.S., Hung, H.P.: A QoS-aware Transcoding Proxy Using On-demand Data Broadcasting. In: IEEE International Conference on Computer Communications, INFOCOMM\u201904 (2004)"},{"key":"22_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/3-540-45760-7_17","volume-title":"Topics in Cryptology - CT-RSA 2002","author":"R. Johnson","year":"2002","unstructured":"Johnson, R., et al.: Homomorphic Signature Schemes. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol.\u00a02271, pp. 244\u2013262. Springer, Heidelberg (2002)"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"Krohn, M.N., Freedman, M.J., Mazires, D.: One-the-Fly Verification of Rateless Erasure Codes for Efficient Content Distribution. In: IEEE Symposium on Research in Security and Privacy, S&P\u201904, pp. 226\u2013240 (2004)","DOI":"10.1109\/SECPRI.2004.1301326"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"Libsie, M., Kosch, H.: Content Adaptation of Multimedia Delivery and Indexing Using MPEG-7. In: ACM Multimedia, MM\u201902, pp. 644\u2013646 (2002)","DOI":"10.1145\/641007.641134"},{"key":"22_CR12","series-title":"Lecture Notes in Computer Science","first-page":"74","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"S. Micali","year":"2004","unstructured":"Micali, S., et al.: Sequential Aggregate Signatures from Trapdoor Permutations. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 74\u201390. Springer, Heidelberg (2004)"},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"Lysyanskaya, A., Tamassia, R., Trandopoulos, N.: Multicast Authentication in Fully Adversarial Networks. In: IEEE Symposium on Research in Security and Privacy, S&P\u201904, pp. 241\u2013255 (2004)","DOI":"10.1109\/SECPRI.2004.1301327"},{"key":"22_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/11602897_33","volume-title":"Information and Communications Security","author":"T. Li","year":"2005","unstructured":"Li, T., Zhu, H., Wu, Y.: Multi-Source Stream Authentication Framework in case of Composite MPEG-4 Stream. In: Qing, S., et al. (eds.) ICICS 2005. LNCS, vol.\u00a03783, pp. 389\u2013401. Springer, Heidelberg (2005)"},{"key":"22_CR15","doi-asserted-by":"crossref","unstructured":"Miyazaki, K., Hanaoka, G., Imai, H.: Digitally Signed Document Sanitizing Scheme Based on Bilinear Maps. In: ACM Symposium on Information, Computer and Communications Security, ASIACCS\u201906, pp. 343\u2013354 (2006)","DOI":"10.1145\/1128817.1128868"},{"key":"22_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1007\/0-387-34805-0_21","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"R.C. Merkle","year":"1990","unstructured":"Merkle, R.C.: A Certified Digital Signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 218\u2013238. Springer, Heidelberg (1990)"},{"key":"22_CR17","doi-asserted-by":"crossref","unstructured":"Miner, S., Staddon, J.: Graphy-based Authentication of Digital Streams. In: EEE Symposium on Research in Security and Privacy, S&P\u201901, pp. 232\u2013246 (2001)","DOI":"10.1109\/SECPRI.2001.924301"},{"key":"22_CR18","doi-asserted-by":"crossref","unstructured":"Naccache, D., Pointcheval, D., Stern, J.: Twin Signatures: An Alternative to the Hash-and-Sign Paradigm. In: ACM Conference on Computer and Communications Security, CCS\u201901, pp. 20\u201327 (2001)","DOI":"10.1145\/501983.501987"},{"key":"22_CR19","doi-asserted-by":"crossref","unstructured":"Ooi, W.T., van Renesse, R.: Distributing Media Transformation Over Multiple Media Gateways. In: ACM Multimedia, MM\u201901, pp. 159\u2013168 (2001)","DOI":"10.1145\/500141.500166"},{"key":"22_CR20","doi-asserted-by":"crossref","unstructured":"Perrig, A.: The BiBa One-Time Signature and Broadcast Authentication Protocol. In: ACM Conference on Computer and Communication Security, CCS\u201901, pp. 28\u201337 (2001)","DOI":"10.1145\/501983.501988"},{"key":"22_CR21","doi-asserted-by":"crossref","unstructured":"Perrig, A., et al.: Efficient Authentication and Signing of Multicast Streams Over Lossy Channels. In: IEEE Symposium on Research in Security and Privacy, S&P\u201900, pp. 56\u201373 (2000)","DOI":"10.1109\/SECPRI.2000.848446"},{"issue":"2","key":"22_CR22","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1145\/762476.762480","volume":"6","author":"J.M. Park","year":"2003","unstructured":"Park, J.M., Chong, E., Siegel, H.J.: Efficient Multicast Packet Authentication Using Erasure Codes. ACM Transactions on Information and Security Security\u00a06(2), 258\u2013285 (2003)","journal-title":"ACM Transactions on Information and Security Security"},{"key":"22_CR23","unstructured":"Perrig, A., et al.: Efficient and Secure Source Authentication for Multicast. In: Network and Distributed System Security Symposium, NDSS\u201901 (2001)"},{"key":"22_CR24","doi-asserted-by":"crossref","unstructured":"Peng, C., et al.: A flexible and scalable authentication scheme for JPEG2000 image codestreams. In: ACM Multimedia, MM\u201903, pp. 433\u2013441 (2003)","DOI":"10.1145\/957013.957101"},{"key":"22_CR25","unstructured":"Pannetrat, A., Molva, R.: Efficient Multicast Packet Authentication. In: Network and Distributed System Security Symposium, NDSS\u201903 (2003)"},{"key":"22_CR26","doi-asserted-by":"crossref","unstructured":"Rohatgi, P.: A Compact and Fast Hybrid Signature Scheme for Multicast Packet Authentication. In: ACM Conference on Computer and Communication Security, CCS\u201999, pp. 93\u2013100 (1999)","DOI":"10.1145\/319709.319722"},{"key":"22_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1007\/3-540-36178-2","volume-title":"Information Security and Cryptology - ICISC 2001","author":"Y. Zheng","year":"2002","unstructured":"Zheng, Y., Steinfeld, R., Bull, L.: Content Extraction Signatures. In: Kim, K.-c. (ed.) ICISC 2001. LNCS, vol.\u00a02288, pp. 285\u2013304. Springer, Heidelberg (2002)"},{"key":"22_CR28","unstructured":"Suzuki, T., et al.: A System for End-to-End Authentication of Adaptive Multimedia Content. In: IFIP Conference on Communications and Multimedia Security CMS\u201904 (2004)"},{"key":"22_CR29","volume-title":"JPEG2000 - Image Compression Fundamentals, Standards and Practice","author":"D.S. Taubman","year":"2000","unstructured":"Taubman, D.S., Marcellin, M.W.: JPEG2000 - Image Compression Fundamentals, Standards and Practice. Kluwer Academic Publishers, Dordrecht (2000)"},{"issue":"1","key":"22_CR30","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1109\/TMM.2005.861283","volume":"8","author":"Y. Wu","year":"2006","unstructured":"Wu, Y., Deng, R.H.: Scalable Authentication of MPEG-4 Streams. IEEE Trans. on Multimedia\u00a08(1), 152\u2013161 (2006)","journal-title":"IEEE Trans. on Multimedia"},{"key":"22_CR31","doi-asserted-by":"crossref","unstructured":"Wagner, M., Kellerer, W.: Web Services Selection for Distributed Composition of Multimedia Content. In: ACM Multimedia, MM\u201904, pp. 104\u2013107 (2004)","DOI":"10.1145\/1027527.1027546"},{"key":"22_CR32","first-page":"1463","volume":"428","author":"T. Yuuichi","year":"2003","unstructured":"Yuuichi, T., et al.: ASIA: Information Sharing System with Derived Content Restriction Management. IEICE Transactions on Communications\u00a0428, 1463\u20131475 (2003)","journal-title":"IEICE Transactions on Communications"},{"key":"22_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1007\/3-540-57332-1_10","volume-title":"Advances in Cryptology - ASIACRYPT \u201991","author":"Y. Zheng","year":"1993","unstructured":"Zheng, Y., Hardjono, T., Pieprzyk, J.: Sibling Intractable Function Families and Their Applications. In: Matsumoto, T., Imai, H., Rivest, R.L. (eds.) ASIACRYPT 1991. LNCS, vol.\u00a0739, pp. 124\u2013138. Springer, Heidelberg (1993)"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-72163-5_22.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T22:52:22Z","timestamp":1737067942000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-72163-5_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540721598","9783540721635"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-72163-5_22","relation":{},"subject":[]}}