Enhancing Authentication Protocol from Unauthorized Access

Download Now
Provided by: Creative Commons
Topic: Security
Format: PDF
In this paper, focus on the problem of efficient stream authentication and stream verification and auditing using digital signatures. The goal is to provide integrity, origin authentication, and non repudiation and auditing each and every individual data blocks that comprise digital stream. Content Distribution Networks (CDNs) protect malicious attacks, security mechanisms and auditing mechanisms need to be process of streams. So propose a novel signature amortization technique based on trapdoor hash functions and auditing mechanisms for authenticating each and every individual data blocks in the stream. This technique provides protect from the modification of the content and avoid forgery content access.
Download Now

Find By Topic