Leaker identification in multicast communication

dc.contributor.authorMohamed, Emad Eldin
dc.contributor.authorGuerchi, Driss
dc.date.accessioned2020-10-01T10:16:22Z
dc.date.available2020-10-01T10:16:22Z
dc.date.copyright2012
dc.date.issued2012
dc.descriptionThis conference paper is not available at CUD collection. The version of scholarly record of this conference paper is published in Communications in Computer and Information Science (2012), available online at: https://doi.org/10.1007/978-3-642-30507-8_27en_US
dc.description.abstractMulticast is a communication mode in which data is exchanged among multiple end systems. An important concern in multicast communications is the protection of copyrights. While preventing copyright violations seems very difficult, tracing copyright violators (leaker identification) is more feasible and can be used as a deterrence alternative. In order to identify leakers in a multicast environment, every receiver should obtain a uniquely marked copy of the data. However, delivering unique copies from the sender to the receivers is inefficient. This paper investigates multicast leaker identification and introduces an efficient solution that is based on binary search tree. We introduce the notion of suspicious set that includes suspected end systems. When a leak is detected, all receivers are inserted in the suspicious set. Using a binary search, the suspicious set is refined successively until it includes only the leakers. An analytical study is conducted to evaluate the proposed solution. © Springer-Verlag Berlin Heidelberg 2012.en_US
dc.description.sponsorshipBCS The Chartered Institute for IT,Springer,IEEE - UAE Computer Sectionen_US
dc.identifier.citationMohamed, E.E., Guerchi, D. (2012). Leaker Identification in Multicast Communication. In: R. Benlamri (Eds) Networked Digital Technologies. NDT 2012. Communications in Computer and Information Science, vol 293. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30507-8_27en_US
dc.identifier.isbn978-364230506-1
dc.identifier.issn18650929
dc.identifier.urihttp://dx.doi.org/10.1007/978-3-642-30507-8_27
dc.identifier.urihttp://hdl.handle.net/20.500.12519/243
dc.language.isoenen_US
dc.publisherSpringer Nature Switzerland AGen_US
dc.relationAuthors Affiliations : Mohamed, E.E., School of Engineering, Applied Science and Technology, Canadian University of Dubai, Dubai, United Arab Emirates; Guerchi, D., School of Engineering, Applied Science and Technology, Canadian University of Dubai, Dubai, United Arab Emirates
dc.relation.ispartofseriesCommunications in Computer and Information Science;293 PART 1
dc.rightsLicense to reuse the abstract has been secured from Springer Nature and Copyright Clearance Center.
dc.rights.holderCopyright : © Springer-Verlag Berlin Heidelberg 2012
dc.rights.licenseLicense Number 5486900761566 License date Feb 13, 2023
dc.rights.urihttps://s100.copyright.com/CustomerAdmin/PLF.jsp?ref=c34f27d4-0dc0-4f9c-89be-ca4e162a3bee
dc.subjectAnalytical studiesen_US
dc.subjectBinary searchen_US
dc.subjectBinary search treesen_US
dc.subjectCommunication modeen_US
dc.subjectCopyright protectionsen_US
dc.subjectEnd systemsen_US
dc.subjectMulticast communicationen_US
dc.subjectTracing traitorsen_US
dc.subjectBinary treesen_US
dc.subjectCommunicationen_US
dc.subjectCopyrightsen_US
dc.subjectMulticastingen_US
dc.titleLeaker identification in multicast communicationen_US
dc.typeConference Paperen_US

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Access Instruction 243.pdf
Size:
45.02 KB
Format:
Adobe Portable Document Format
Description: