Impact Factor:6.549
Scopus Suggested Journal: |
International Journal
of Computer Engineering in Research Trends (IJCERT)
Scholarly, Peer-Reviewed, Platinum Open Access and Multidisciplinary
International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed, Platinum Open Access and Multidisciplinary
ISSN(Online):2349-7084 Submit Paper Check Paper Status Conference Proposal
[1] Hiroki Nishiyama, Desmond Fomo, Zubair Md. Fadlullah, and Nei Kato “Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery Networks” IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS,VOL. 25,NO. 2,FEBRUARY 2014. [2] Content Leakage Detection by Using TrafficPattern for Trusted Content Delivery NetworksVol. 5 (6) , 7909- 7913, 2014. [3] Research on the Traffic Behavior Characteristics ofP2P Streaming MediaISSN 2079-8407Vol. 4, No. 1 Jan 2013. [4] K. Matsuda, H. Nakayama, and N. Kato, “A Study on StreamingVideo Detection using Dynamic Traffic Pattern,”IEICETransactions on Communications (Japanese Edition), vol.J19-B,no.02, 2010. [5] Z. Yang, H. Ma, and J. Zhang, “A Dynamic Scalable Service ModelforSIP-Based Video Conference,” Proc. Ninth Int’l Conf. ComputerSupportedCooperative Work in DE, pp. 594-599, May 2005. [6] O. Adeyinka, “Analysis of IPSec VPNs Performance in a MultimediaEnvironment,” Proc. Fourth Int’l Conf. Intelligent Environments,pp. 25-30, 2008. [7] E.I. Lin, A.M. Eskicioglu, R.L. Lagendijk, and E.J. Delp, “Advancesin Digital Video Content Protection,” Proc. IEEE, vol. 93, no. 1,pp. 171-183, Jan. 2005. [8] Y. Liu, Y. Guo, and C. Liang, “A Survey on Peer-toPeer VideoStreamingSystems,” Peer-to Peer Networking and Applications,vol. 1, no. 1, pp. 18-28, Mar. 2008. [9] M. Dobashi, H. Nakayama, N. Kato, Y.Nemoto, and A.Jamalipour, “Traitor Tracing Technology of Streaming ContentsDelivery Using Traffic Pattern in Wired/Wireless Environments,”Proc. IEEE Global Telecomm. Conf., pp. 1-5, Nov./Dec. 2006. [10] J. Schwenk and J. Ueberberg, Tracing Traitors using Finite Geometries, manuscript. [11] B. Chor, A. Fiat, and M. Naor, Tracing Traitors, Proc. Crypto 94, LNCS 839, Springer-Verlag, Berlin, [12] B. Turnbull, “Important legal developments regarding protection of copyrighted content against unauthorized copying,” IEEE Comm. Magazine,vol.39, no.8, pp. 92–100, Aug. 2001.
![]() | V2I1125.pdf |