IJCTT-International Journal of Computer Trends and Technology
Content distribution in network sometimes may be vulnerable henceforth unauthorized users can inject \"Bogus\" data to corrupt the content during its distribution process in order to deplete the network resource. The direct application of network coding may be insecure. Content verification is the important and practical issue when maintaining integrity of the content. While random linear networking coding is used, it is impracticable for the source of the content to sign all the data, and also the traditional methods such as \"Hash and sign\" are no longer applicable.