Saturday, 5 January 2013

On the Security and Efficiency of Content Distribution via Network Coding.

Posted by Tech on Technology  |  1 comment

Abstract:

Content distribution via network coding has received a lot of attention lately. However, direct application of network coding may be insecure. In particular, attackers can inject “bogus” data to corrupt the content distribution process so as to hinder the information dispersal or even deplete the network resource. Therefore, content verification is an important and practical issue when network coding is employed. When random linear network coding is used, it is infeasible for the source of the content to sign all the data, and hence, the traditional “hash-and-sign” methods are no longer applicable. Recently, a new on-the-fly verification technique has been proposed by Krohn et al. (IEEE S&P ’04), which employs a classical homomorphic hash function. However, this technique is difficult to be applied to network coding because of high computational and communication overhead. We explore this issue further by carefully analyzing different types of overhead, and propose methods to help reducing both the computational and communication cost, and provides provable security at the same time.

Notice: After Clicking, Please wait and click SKIP, Download Starts.

Download Links: [ Multiple Links available ]

10:30 Share:
About TechOnTechnology

We are Team TOT Here to Share the Content we have through the internet World. /FaceBook

1 comment:

Get updates in your email box
Complete the form below, and we'll send you the best coupons.

Deliver via FeedBurner

Contact Us

Name

Email *

Message *

Wikipedia

Search results

Total Pageviews

Translate

About Us

We are here to share the content we have, In this site we are going to share Some IEEE Paper Implementations with their Source code and Documents. Hope it may be usefull for some Students Searching for.... Join Us @ Facebook
back to top