已收录 273590 条政策
 政策提纲
  • 暂无提纲
A Hash-Chain Based Method for Full or Partial Authentication of Communication in a Real-Time Wireless Environment
[摘要] Real-time media streams are a common application on the Internet today. For many such streams, it is necessary to provide authentication, data integrity, and non-repudiation.Some applications where this type of security may be necessary include voice-over-IP (VoIP) calls, transmission of sensitive data such as medical records or personal information, or financial data that needs to be updated in real-time. It is important to be able to balance the need for security with the constraints of the environment, where data must be delivered in a limited amount of time.This thesis examines and classifies the different types of authentication based on anumber of factors, mainly the type of authentication (user or data), the way in which authentication information is transmitted (embedded or appendix), and the secrecy of the authentication information (covert or overt). This thesis then presents a specific real-time communication system, and develops a novel method of achieving data authentication for the system, based on previous work done in the area of hash-chaining authentication schemes. Theoretical and simulated results are presented, showing that the new method,the modified butterfly scheme, outperforms the original method, the butterfly scheme,using the same amount of overhead.
[发布日期]  [发布机构] University of Waterloo
[效力级别]  [学科分类] 
[关键词] Electrical and Computer Engineering [时效性] 
   浏览次数:8      统一登录查看全文      激活码登录查看全文