The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we show how a dealer with limited resources is possible to share the secrets to players via an untrusted cloud server without compromising the privacy of the secrets. This scheme permits a batch of two secret messages to be shared to two players in such a way that the secrets are reconstructable if and only if two of them collaborate. An individual share reveals absolutely no information...
This paper discusses how to add privacy features to the Janus WebRTC media server and gateway. In order to do so, we embrace a standard approach, by leveraging work currently ongoing within the IETF PERC working group. PERC stands for Privacy Enhanced RTP Conferencing and is aimed at enabling centralized real-time conferencing in a scenario where the central media forwarding entity is not required...
The Cloud Computing is a developing IT concept that faces some issues, which are slowing down its evolution and adoption by users across the world. The lack of security has been the main concern. Organizations and entities need to ensure, inter alia, the integrity and confidentiality of their outsourced sensible data within a cloud provider server. Solutions have been examined in order to strengthen...
Cloud storage technology is an important research orientation in cloud computing field. Due to privacy leakage and security problems, it is difficult for organizations holding core data (such as innovative enterprise and army) to extensively apply public cloud storage service. In this paper, a secure private cloud storage system VI-PCS based on virtual isolation mechanism is put forward. The system...
Voice over Internet Protocol (VoIP) has accomplished enormous growth in recent years due to its low cost and flexible service enhancement. Session Initiation Protocol (SIP) is a communication protocol for signaling and managing the media streams (voice, video and audio) over IP based network. The well-known contribution in securing a VoIP voice packet is Advanced Encryption Standard (AES) with a secret...
Media sharing in cloud environment, which supports sharing media content at any time and from anywhere, is a promising paradigm of social interaction. However, it also brings forth security issues in terms of data confidentiality and access control on media data consumers with different access privileges. One promising solution is scalable media access control, which is capable of providing data confidentiality...
Distributed data storage is a topic of growing importance due to the mounting pressure to find the right balance between capacity, cost, privacy and other non-functional properties. Compared to central storage on physical media, on the network or in a cloud storage service, advanced data distribution techniques offer additional safety, security and performance. On the downside, these advantages come...
This paper introduces functions and features of the MPEG-4 streaming media, combine its media properties with Microsoft's digital rights management component WMRM, design and implemented the digital rights management system based on MPEG-4 streaming media, this system possessed a higher Security and stability, it has a high application value on development of streaming media in e-commerce.
A peer-to-peer (P2P) architecture for video conferencing has great prospects for development. The security of the system, however, poses a set of significant challenges. In order to ensure the transmission security of the information of the video conferencing system P2P-based, in this paper, we report a set of new security architecture, and establish the corresponding security management strategy...
This work concentrates on the design of an efficient and scalable group rekey method for P2P IPTV DRM system where the minimal division of right is a program. Our group rekey scheme is efficient in two aspects, less number of encryption and less individual transmission. We divide the members into three categories, namely, the fresh members, the rejoined members, and the remaining members, according...
If the results of the latest studies of ABI Research for Internet usage are to be believed, worldwide twelve million TV consumers will be using Internet Protocol Television (IPTV) instead of the traditional TV broadcasting by the end of 2010. Furthermore, analysts of Informa Telecoms & Media are forecasting the worldwide grow in revenue of IPTV to be ten billion US dollar by 2010. The revolution...
The Internet Protocol Television (IPTV) service provides rich multimedia services over IP networks and is considered as a potential killer application over the Internet. The intellectual property management protocol (IPMP) system becomes important in developing this network media applications. In this paper, security function, media streaming service system and the user terminal that adopted IPMP...
Voice-over-IP (VoIP)-based services are becoming a popular alternative to traditional public switched telephony. The increasing number of users make VoIP also an interesting target for attackers. VoIP phishing and identity theft are gaining relevance. The lack of options for the reliable authentication between communication partners and the possibilities for anonymisation in IP-based telephony will...
In order to promote the development of the public security information building, the remote public security business information system comes into being. Because a lot of information for the public security is related to confidential information, it must be taken a digital copyright protection and encryption to ensure using the information safely. By analyzing a DRM working principle, this paper puts...
The purpose of this article is to discuss an authentication method for peer to peer (P2P)-based streaming media. Methods of encryption of streaming media data and digital signatures were used to improve the safety of the media. The digital certificate publishing service and management services of live streaming media authentication information are expanded in the live stream system based on P2P networks...
In the present paper a novel system and its architecture is presented. The aim of this system is to enable personalized view, scalable, seamless and trusted multimedia content delivery, while protecting content from unauthorized access. Moreover, the system aims to keep bandwidth requirements low and increase the perceived quality of service (PQoS). This content delivery is done through multiple kinds...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.