Research Paper | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014
Stream Authentication Using Trapdoor Hash Function
Dodla Padmaja, P. Srilatha
Web based services engage distribution of contents like digital audio, video, games, software, stock quotes, Streaming presentations and live news feeds throughout distributed networking technologies, like Content Distribution Networks (CDNs), multicast networks, and peer-to-peer networks. We guard delay sensitive streams against malicious attacks, auditing mechanisms and security mechanisms need to be designed to efficiently process long sequence of bits. We have proposed a novel signature amortization technique based on trapdoor hash functions for authenticating each and every individual data blocks in the stream. Our technique affords for each and every intermediate blocks in the stream we want to stay away from the transmission loss and we will afford constant memory requirements for sender as well as receiver and we want to authenticate and verify the stream to keep away from unauthenticated user and to avoid malicious content.
Keywords: Stream authentication, cryptography, content distribution network, trap door functions
Edition: Volume 3 Issue 9, September 2014
Pages: 1292 - 1295
How to Cite this Article?
Dodla Padmaja, P. Srilatha, "Stream Authentication Using Trapdoor Hash Function", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SEP14343, Volume 3 Issue 9, September 2014, 1292 - 1295
108 PDF Views | 83 PDF Downloads
Similar Articles with Keyword 'cryptography'
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1057 - 1058Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS
Pranita Prakash Kulkarni
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1069 - 1073Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN
Rucha Agrawal, Simran Khiani
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1200 - 1203Efficient Hardware Encryption Using Lightweight Process
Deeksha Bhardwaj, Rohit Pawar, Aman Jain
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2535 - 2538A Survey on Security Mechanism using Colors and Armstrong Numbers
Nutan Gurav, Pratap Singh
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1525 - 1529Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image
Maulik P. Chaudhari, Neha Parmar
Similar Articles with Keyword 'content distribution network'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 1292 - 1295Stream Authentication Using Trapdoor Hash Function
Dodla Padmaja, P. Srilatha
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 2, February 2017
Pages: 710 - 714A Novel Approach Where Cloud Computing Meets Content Delivery Network
Shipra Goswami