Leaker identification in multicast communication

dc.contributor.author Mohamed, Emad Eldin
dc.contributor.author Guerchi, Driss
dc.date.accessioned 2020-10-01T10:16:22Z
dc.date.available 2020-10-01T10:16:22Z
dc.date.copyright 2012
dc.date.issued 2012
dc.description This conference paper is not available at CUD collection. The version of scholarly record of this conference paper is published in Communications in Computer and Information Science (2012), available online at: https://doi.org/10.1007/978-3-642-30507-8_27 en_US
dc.description.abstract Multicast is a communication mode in which data is exchanged among multiple end systems. An important concern in multicast communications is the protection of copyrights. While preventing copyright violations seems very difficult, tracing copyright violators (leaker identification) is more feasible and can be used as a deterrence alternative. In order to identify leakers in a multicast environment, every receiver should obtain a uniquely marked copy of the data. However, delivering unique copies from the sender to the receivers is inefficient. This paper investigates multicast leaker identification and introduces an efficient solution that is based on binary search tree. We introduce the notion of suspicious set that includes suspected end systems. When a leak is detected, all receivers are inserted in the suspicious set. Using a binary search, the suspicious set is refined successively until it includes only the leakers. An analytical study is conducted to evaluate the proposed solution. © Springer-Verlag Berlin Heidelberg 2012. en_US
dc.description.sponsorship BCS The Chartered Institute for IT,Springer,IEEE - UAE Computer Section en_US
dc.identifier.citation Mohamed, E. E., & Guerchi, D. (2012). Leaker identification in multicast communication. Communications in Computer and Information Science (Vol. 293 PART 1). https://doi.org/10.1007/978-3-642-30507-8_27 en_US
dc.identifier.isbn 978-364230506-1
dc.identifier.issn 18650929
dc.identifier.uri http://dx.doi.org/10.1007/978-3-642-30507-8_27
dc.identifier.uri http://hdl.handle.net/20.500.12519/243
dc.language.iso en en_US
dc.publisher Springer Nature Switzerland AG en_US
dc.relation Authors Affiliations : Mohamed, E.E., School of Engineering, Applied Science and Technology, Canadian University of Dubai, Dubai, United Arab Emirates; Guerchi, D., School of Engineering, Applied Science and Technology, Canadian University of Dubai, Dubai, United Arab Emirates
dc.relation.ispartofseries Communications in Computer and Information Science;293 PART 1
dc.rights License to reuse the abstract has been secured from Springer Nature and Copyright Clearance Center.
dc.rights.holder Copyright : © Springer-Verlag Berlin Heidelberg 2012
dc.rights.license License Number: 5241281302092 License date: Feb 03, 2022
dc.rights.uri https://s100.copyright.com/CustomerAdmin/PLF.jsp?ref=aec61ff0-c2e6-42c2-ac32-93ae3b85c423
dc.subject Analytical studies en_US
dc.subject Binary search en_US
dc.subject Binary search trees en_US
dc.subject Communication mode en_US
dc.subject Copyright protections en_US
dc.subject End systems en_US
dc.subject Multicast communication en_US
dc.subject Tracing traitors en_US
dc.subject Binary trees en_US
dc.subject Communication en_US
dc.subject Copyrights en_US
dc.subject Multicasting en_US
dc.title Leaker identification in multicast communication en_US
dc.type Conference Paper en_US
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
2.01 KB
Item-specific license agreed upon to submission