Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Multi-user security: A signal proces...
~
Trappe, Wade.
Linked to FindBook
Google Book
Amazon
博客來
Multi-user security: A signal processing and networking perspective.
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Multi-user security: A signal processing and networking perspective./
Author:
Trappe, Wade.
Description:
216 p.
Notes:
Chairman: K. J. Ray Liu.
Contained By:
Dissertation Abstracts International63-06B.
Subject:
Computer Science. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3055474
ISBN:
0493714197
Multi-user security: A signal processing and networking perspective.
Trappe, Wade.
Multi-user security: A signal processing and networking perspective.
- 216 p.
Chairman: K. J. Ray Liu.
Thesis (Ph.D.)--University of Maryland College Park, 2002.
The advancements in communication and multimedia technologies have paved the way for a new suite of multi-user applications that will allow users to interact. Although the new communication infrastructure makes it easier to reach the end user, it also makes it easier for adversaries to mount attacks against security measures intended to protect data. Thus, there must be mechanisms in place that guarantee the confidentiality and rights of both the customer and the service provider during the delivery of content across future communication networks.
ISBN: 0493714197Subjects--Topical Terms:
626642
Computer Science.
Multi-user security: A signal processing and networking perspective.
LDR
:03361nam 2200313 a 45
001
933143
005
20110505
008
110505s2002 eng d
020
$a
0493714197
035
$a
(UnM)AAI3055474
035
$a
AAI3055474
040
$a
UnM
$c
UnM
100
1
$a
Trappe, Wade.
$3
811680
245
1 0
$a
Multi-user security: A signal processing and networking perspective.
300
$a
216 p.
500
$a
Chairman: K. J. Ray Liu.
500
$a
Source: Dissertation Abstracts International, Volume: 63-06, Section: B, page: 2906.
502
$a
Thesis (Ph.D.)--University of Maryland College Park, 2002.
520
$a
The advancements in communication and multimedia technologies have paved the way for a new suite of multi-user applications that will allow users to interact. Although the new communication infrastructure makes it easier to reach the end user, it also makes it easier for adversaries to mount attacks against security measures intended to protect data. Thus, there must be mechanisms in place that guarantee the confidentiality and rights of both the customer and the service provider during the delivery of content across future communication networks.
520
$a
This thesis examines security issues related to communications involving more than two participants or adversaries. We approach the problem of multi-user security by developing security measures at different stages of the content distribution process, ranging from the establishment of initial keying information before transmission, to key management while delivering through networks, and finally to content protection and collusion prevention/tracing after delivery.
520
$a
We address the issue of establishing a group key prior to content delivery by introducing the butterfly scheme and a conference keying scheme that addresses user heterogeneity. These schemes employ the two-party Diffie-Hellman scheme in conjunction with an underlying algorithmic tree called the conference tree. In order to address client heterogeneity, we design the conference tree using source coding techniques to account for the different user cost and budget profiles. We also introduce the PESKY performance measure, which quantifies the likelihood that a conference key can be established in a heterogeneous environment.
520
$a
We then consider the problem of managing keys during content delivery by proposing a multicast key management system that uses a composite message format with member join and departure operations. Compared with the traditional format of the rekeying messages used in tree-based multicast key management, our composite message format reduces the amount of header information, while maintaining the same payload size.
520
$a
Finally, we address the issue of protecting the digital rights of multimedia content after it has left the protected or encrypted domain. Since traditional multimedia fingerprints are susceptible to collusion attacks made by a coalition of adversaries, we develop fingerprints for multimedia that are based upon code modulation and able to identify groups of colluders.
590
$a
School code: 0117.
650
4
$a
Computer Science.
$3
626642
690
$a
0984
710
2 0
$a
University of Maryland College Park.
$3
1249734
773
0
$t
Dissertation Abstracts International
$g
63-06B.
790
$a
0117
790
1 0
$a
Liu, K. J. Ray,
$e
advisor
791
$a
Ph.D.
792
$a
2002
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3055474
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9103831
電子資源
11.線上閱覽_V
電子書
EB W9103831
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login