語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Multi-user security: A signal proces...
~
Trappe, Wade.
FindBook
Google Book
Amazon
博客來
Multi-user security: A signal processing and networking perspective.
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Multi-user security: A signal processing and networking perspective./
作者:
Trappe, Wade.
面頁冊數:
216 p.
附註:
Chairman: K. J. Ray Liu.
Contained By:
Dissertation Abstracts International63-06B.
標題:
Computer Science. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3055474
ISBN:
0493714197
Multi-user security: A signal processing and networking perspective.
Trappe, Wade.
Multi-user security: A signal processing and networking perspective.
- 216 p.
Chairman: K. J. Ray Liu.
Thesis (Ph.D.)--University of Maryland College Park, 2002.
The advancements in communication and multimedia technologies have paved the way for a new suite of multi-user applications that will allow users to interact. Although the new communication infrastructure makes it easier to reach the end user, it also makes it easier for adversaries to mount attacks against security measures intended to protect data. Thus, there must be mechanisms in place that guarantee the confidentiality and rights of both the customer and the service provider during the delivery of content across future communication networks.
ISBN: 0493714197Subjects--Topical Terms:
626642
Computer Science.
Multi-user security: A signal processing and networking perspective.
LDR
:03361nam 2200313 a 45
001
933143
005
20110505
008
110505s2002 eng d
020
$a
0493714197
035
$a
(UnM)AAI3055474
035
$a
AAI3055474
040
$a
UnM
$c
UnM
100
1
$a
Trappe, Wade.
$3
811680
245
1 0
$a
Multi-user security: A signal processing and networking perspective.
300
$a
216 p.
500
$a
Chairman: K. J. Ray Liu.
500
$a
Source: Dissertation Abstracts International, Volume: 63-06, Section: B, page: 2906.
502
$a
Thesis (Ph.D.)--University of Maryland College Park, 2002.
520
$a
The advancements in communication and multimedia technologies have paved the way for a new suite of multi-user applications that will allow users to interact. Although the new communication infrastructure makes it easier to reach the end user, it also makes it easier for adversaries to mount attacks against security measures intended to protect data. Thus, there must be mechanisms in place that guarantee the confidentiality and rights of both the customer and the service provider during the delivery of content across future communication networks.
520
$a
This thesis examines security issues related to communications involving more than two participants or adversaries. We approach the problem of multi-user security by developing security measures at different stages of the content distribution process, ranging from the establishment of initial keying information before transmission, to key management while delivering through networks, and finally to content protection and collusion prevention/tracing after delivery.
520
$a
We address the issue of establishing a group key prior to content delivery by introducing the butterfly scheme and a conference keying scheme that addresses user heterogeneity. These schemes employ the two-party Diffie-Hellman scheme in conjunction with an underlying algorithmic tree called the conference tree. In order to address client heterogeneity, we design the conference tree using source coding techniques to account for the different user cost and budget profiles. We also introduce the PESKY performance measure, which quantifies the likelihood that a conference key can be established in a heterogeneous environment.
520
$a
We then consider the problem of managing keys during content delivery by proposing a multicast key management system that uses a composite message format with member join and departure operations. Compared with the traditional format of the rekeying messages used in tree-based multicast key management, our composite message format reduces the amount of header information, while maintaining the same payload size.
520
$a
Finally, we address the issue of protecting the digital rights of multimedia content after it has left the protected or encrypted domain. Since traditional multimedia fingerprints are susceptible to collusion attacks made by a coalition of adversaries, we develop fingerprints for multimedia that are based upon code modulation and able to identify groups of colluders.
590
$a
School code: 0117.
650
4
$a
Computer Science.
$3
626642
690
$a
0984
710
2 0
$a
University of Maryland College Park.
$3
1249734
773
0
$t
Dissertation Abstracts International
$g
63-06B.
790
$a
0117
790
1 0
$a
Liu, K. J. Ray,
$e
advisor
791
$a
Ph.D.
792
$a
2002
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3055474
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9103831
電子資源
11.線上閱覽_V
電子書
EB W9103831
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入