loading
Papers

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Ahmed Reda Kaced and Jean-Claude Moissinac

Affiliation: Graduate School of Telecommunications, France

ISBN: 978-972-8865-63-4

Keyword(s): Adaptive multimedia, encryption, digital signatures, content adaptation, multimedia security.

Related Ontology Subjects/Areas/Topics: Information and Systems Security ; Intrusion Detection & Prevention

Abstract: By breaking the end-to-end nature of the communication, proxies render the task of providing end-to-end security much harder or even impossible in some cases. In this paper, we will address the questions of when and how end-to-end security, like confidentiality and authenticity can be preserved, in a multimedia content delivery platform, when having one or more adaptation proxies in the data path. We describe SEMAFOR, a platform for protecting adaptive multimedia content delivery in heterogeneous environments. SEMAFOR aims to deliver an end-to-end authenticity of original content exchanged in a heterogeneous network while allowing content adaptation by intermediary proxies between the content transmitter and the final users. Adaptation and authentication management are done by the intermediary proxies, transparently to connected hosts, which totally make abstraction of these processes. SEMAFOR provides AMCA a new content authentication based on multi-hop signature scheme using a Mer kle Hash Tree, and XSST a secured transaction protocol that gives securely exchanges of transactions in SEMAFOR. (More)

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 35.175.120.174

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Reda Kaced A.; Moissinac J. and (2006). PROTECTING ADAPTIVE MULTIMEDIA DELIVERY AND ADAPTATION USING PROXY BASED APPROACH.In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006) ISBN 978-972-8865-63-4, pages 87-90. DOI: 10.5220/0002104500870090

@conference{secrypt06,
author={Ahmed {Reda Kaced} and Jean{-}Claude Moissinac},
title={PROTECTING ADAPTIVE MULTIMEDIA DELIVERY AND ADAPTATION USING PROXY BASED APPROACH},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006)},
year={2006},
pages={87-90},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002104500870090},
isbn={978-972-8865-63-4},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006)
TI - PROTECTING ADAPTIVE MULTIMEDIA DELIVERY AND ADAPTATION USING PROXY BASED APPROACH
SN - 978-972-8865-63-4
AU - Reda Kaced, A.
AU - Moissinac, J.
PY - 2006
SP - 87
EP - 90
DO - 10.5220/0002104500870090

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.