This application claims priority to and the benefit of copending U.S provisional patent application entitled "Authenticast: Adaptive Protocol to Enable Strong Authentication in High-Performance Applications" filed on Oct. 28, 1997 and accorded Ser. No. 60/063,551, which is incorporated herein by reference.
The U.S. government has a paid-up license in this invention and the right in limited circumstances to require the patent owner to license others on reasonable terms as provided for by the terms of DAAH04-96-1-0209 awarded by the U.S. Department of Defense.
Number | Name | Date | Kind |
---|---|---|---|
4771391 | Blasbalg | Sep 1988 | |
4965827 | McDonald | Oct 1990 | |
5005137 | Ernst | Apr 1991 | |
5107415 | Sato et al. | Apr 1992 | |
5477531 | McKee et al. | Dec 1995 | |
5481735 | Mortensen et al. | Jan 1996 | |
5490252 | Macera et al. | Feb 1996 | |
5511122 | Atkinson | Apr 1996 | |
5541852 | Eyuboglu et al. | Jul 1996 | |
5544322 | Cheng et al. | Aug 1996 | |
5550984 | Gelb | Aug 1996 | |
5566310 | Mathewson, II | Oct 1996 | |
5586260 | Hu | Dec 1996 | |
5590197 | Chen et al. | Dec 1996 | |
5623601 | Vu | Apr 1997 | |
5627970 | Keshav | May 1997 | |
5627972 | Shear | May 1997 | |
5642360 | Trainin | Jun 1997 | |
5689566 | Nguyen | Nov 1997 | |
5715397 | Ogawa et al. | Feb 1998 | |
5727159 | Kikinis | Mar 1998 | |
5737535 | Bagley et al. | Apr 1998 | |
5761438 | Sasaki | Jun 1998 | |
5764921 | Banham et al. | Jun 1998 | |
5768536 | Strongin et al. | Jun 1998 | |
5784571 | Mantopoulos et al. | Jul 1998 | |
5784572 | Rostoker et al. | Jul 1998 | |
5784578 | Galloway et al. | Jul 1998 | |
5793763 | Mayes et al. | Aug 1998 |
Entry |
---|
Meyer, et al., "MPEG-FAQ 4.1," Security Mechanisms for Multimedia-Data with the Example MPEG-I-Project, Project Description of SECMPEG, 1995, pp. 1-2. |
Jha, et al., "Adaptive Resource Allocation for Embedded Parallel Applications," Proceedings of the Third International Conference on High Performance Computing, Dec. 1996. |
Ivan-Rosu, et al., "Improving Protocol Performance by Dynamic Control of Communication Resources," Proceedings of the 2.sup.nd IEEE Conference on Complex Computer Systems (ICECCS), Oct. 1996. |
Rosu, et al., "On Adaptive Resource Allocation for Complex Real-Time Applications," Proceedings of the 18th IEEE Real-Time Systems Symposium (RTSS), IEEE, 1997. |
Schneck, et al., "DRRM: Dynamic Resource Reservation Manager," International Conference on Computer Communications and Networks, IEEE, 1996. |
Waldsperger, et al., "Lottery Scheduling: Flexible Proportional-Share Resource Management," Operating Systems Review, 1994, pp. 1-12. |
Agi, et al., "An Empirical Study of Secure MPEG Video Transmissions," IEEE, Mar. 1996, pp. 1-8. |
Li, et al., "Security Enhanced MPEG Player," Department of Computer Science, Unviersity of Illinois at Urbana-Champaign, 1996. |
Nahrstedt, et al., "Resource Management in Networked Multimedia Systems," Handbook of Multimedia Networking, Auerbach Publications, 1995, pp. 381-405. |
Needham, et al., "Using Encryption for Authentication in Large Networks of Computers," Communications of the ACM, vol. 21, No. 12, Dec. 1978, pp. 210-216. |
Reiter, et al., "A security Architecture for Fault-Tolerant Systems," ACM Transactions on Computer Systems, vol. 12, No. 4, Nov. 1994, pp. 340-371. |
Larry L. Peterson, "OS Support for High-Speed Networking," http://www.cs.arizona.edu/xkernel/projects/cryptography-and-protocols, pp. 1-11. |
Hudson, et al., "Techniques for Addressing Fundamental Privacy and Disruption Tradeoffs in Awareness Support Systems," Proceedings of the ACM 1996 Conference on Computer Supported Cooperative Work, pp. 248-257. |
Varadharajan, et al., "A Practical Approach to Design and Management of Secure ATM Networks," Jul. 1997 pp. 213-232. |
Rumen Stainov, "Dynamic Protocol Configuration for Multimedia Networks," Microprocessing and Microprogramming, 38, 1993, pp. 741-748. |