Abstract
Media distribution over the Internet is a fact. Finding a way to protect content streaming is a hot topic. This paper presents both a new and efficient key multicasting protocol based on the use of orthogonal systems in vector spaces, and its scalable implementation by means of a platform independent server. The protocol outstands in exchanging a small number of tiny messages which helps the server to scale when facing a huge number of legitimate users.
Similar content being viewed by others
References
Janakova M (2011) Database technology analysis for the support or instant information retrieval. Int J Comput Inf Syst Ind Manag Appl 3:586–593
Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2011–2016, White Paper, Cisco, June, 2011, http://www.cisco.com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns827/white_paper_c11-520862.pdf
Yamakami T (2003) Toward understanding the mobile Internet user behavior: a methodology for user clustering with aging analysis. In: Parallel and distributed computing, applications and technologies, pp 85–89
Rafaeli S, Hutchison D (2003) A survey of key management for secure group communication. ACM Comput Surv 35(3):309–329
Shoufan A, Huss SA (2009) High-performance rekeying processor architecture for group key management. IEEE Trans Comput 58:1421–1434
Hssane AB, Hasnaoui ML, Benkirane S, Ezzati A, Benalla S (2011) Modified Gram Schmidt algorithm applied to localization for wireless sensor networks. In: International conference on multimedia computing and systems (ICMCS), 7–9 April 2011, pp 1–5
Yin J, Dong F, Wang N (2009) Modified Gram–Schmidt algorithm for extreme learning machine. In: Second international symposium on computational intelligence and design, 12–14 Dec 2009. ISCID ’09, vol 2, pp 517–520
Lopez-Ramos JA, Rosenthal J, Schipani D (2010) Managing key multicasting through orthogonal systems. Preprint
Ardnt H (2010) The universal Java matrix package: everything is a matrix! ICML/MLOSS, Haifa, 2010-06-25
Widdows D, Cohen T (2010) The semantic vectors package: new algorithms and public tools for distributional semantics. In: IEEE fourth international conference on semantic computing (ICSC), 22–24 Sept 2010, pp 9–15
Fan W, Chen X, Li X (2010) Parallelization of RSA algorithm based on compute unified device architecture. In: 9th International conference on grid and cooperative computing (GCC), 1–5 Nov 2010, pp 174–178
Shavit N (2011) Data structures in the multicore age. Commun ACM 54(3):76–84
Pang W-M, Wong T-T, Heng P-A (2008) Generating massive high-quality random numbers using GPU. In: IEEE world congress on computational intelligence, 1–6 June 2008, pp 841–847
Bierstaker JL, Burnaby P, Thibodeau J (2001) The impact of information technology on the audit process: an assessment of the state of the art and implications for the future. Manag Audit J 16(3):159–164
Church BK, McMillan JJ, Schneider A (2001) Factors affecting internal auditors’ consideration of fraudulent financial reporting during analytical procedures. Auditing: J Pract Theory 20(1):65–80
Beasley M, Carcello JV, Hermanson DR (1999) An analysis of U.S. public companies fraudulent financial reporting: 1987–1997. AICPA, New York
Glover SM (1998) The next generation software. Intern Auditor 55(4):47–52
Maulik R, Chaki N (2011) A study on wormhole attacks in MANET. Int J Comput Inf Syst Ind Manag Appl 3:271–279
Pons Ortega F (2007) Auditoría informática. Una aproximación a la mejora del control interno. Auditoría pública, revista de los órganos autonómicos de control externo 41, pp 97–100
Acknowledgements
This work has been supported by grants from the Spanish Ministry of Science and Innovation: (TIN2008-01117) and (TEC2009-13763-C02-02). By grants from Junta de Andalucía (P08-TIC-3518) and (FQM 0211), and in part financed by the European Regional Development Fund (ERDF).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Álvarez-Bermejo, J.A., Antequera, N., García-Rubio, R. et al. A scalable server for key distribution and its application to accounting. J Supercomput 64, 132–143 (2013). https://doi.org/10.1007/s11227-012-0787-5
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-012-0787-5