参考文献 [1] 李 洋, 徐国爱, 钮心忻, 等. 树链混合的组播源认证改进方案[J]. 华中科技大学学报: 自然科学版, 2011, 39(7): 50-53. [2] Park Y, Cho Y. The eSAIDA Stream Authentication Scheme[C]// Proc. of International Conference on Computation Science and Its Applications: [S. 1.]: IEEE Press, 2004: 214-222. [3] Pannetrat A, Molva R. Efficient Multicast Packet Authentic- ation[C]//Proc. of Network and Distributed Systems Security Symposium. San Diego, USA: [s. n.], 2003: 321-329. [4] Munoz J, Forne J, Esparza O, et al. Efficient Certificate Revoc- ation System Implementation: Huffman Merkle Hash Tree(HuffMHT)[C]//Proc. of TrustBus’05. [S. 1.]: IEEE Press, 2005: 119-127. [5] Tamassia R, Triandopoulos N. Efficient Content Authentication in Peer-to-peer Networks[C]//Proc. of the 5th International Conference on Applied Cryptography and Network Security. Zhuhai, China: [s. n.], 2007: 223-228. [6] Habib A, Xu D, Atallah M, et al. A Tree-based Forward Digest Protocol to Verify Data Integrity in Distributed Media Streaming[J]. IEEE Transactions on Knowledge and Data Engineering, 2005, 17(7): 1010-1014. (下转第32页) (上接第17页) [7] Merkle R. A Certified Digital Signature[C]//Proc. of Cryptolo’89. [S. 1.]: IEEE Press, 1989: 267-274. [8] Kandappu T, Sivaraman V, Boreli R. A Novel Unbalanced Tree Structure for Low-cost Authentication of Streaming Content on Mobile and Sensor Devices[C]//Proc. of the 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks. Seoul, Korea: [s. n.], 2012: 368-376. [9] Li Liangbin, Wang Jinlin, Niu Erli, et al. Improving Content Authentication Efficiency of Online Multimedia Service[C]// Proc. of the 2nd International Conference on Networks Security Wireless Communications and Trusted Computing. Wuhan, China: [s .n.], 2010: 158-262. [10] Hefeeda M. Authentication Schemes for Multimedia Streams: Quantitative Analysis and Comparison[J]. ACM Transactions on Multimedia Computing, Communications and Applications, 2010, 6(1): 1-24. [11] Wang Jinlin, Wang Lingfang, Song Lei. LandHouse: A Network Storage Structure Combining Regular Graph with Distributed Hash Table and Its Data Accessing Methods[C]// Proc. of the 3rd International Symposium on Intelligent Information Technology Application. Nanchang, China: [s. n.], 2009: 265-271. [12] Breslau L, Cao P, Fan L, et al. Web Caching and Zipf-like Distributions: Evidence and Implications[C]//Proc. of the 18th Annual Joint Conference on IEEE Computer and Communi- cation Societies. New York, USA: [s. n.], 1999: 265-275. 编辑 索书志 |