Mohammed Boutabia

Learn More
The prospection of video streaming security has been changed considerably during the last years. With the new generation of hand healed devices and the delivery rate up to 2 Mb/s, the new prospection searched for fast security measures that have no great effects on the streaming fluidity. The hash chain has been largely used for such applications. The(More)
IEEE 802.16e is a mobile version of Worldwide Interoperability for Microwave Access (WiMAX) that plays an important role in the evolution towards 4G. In this work, we focus on multimedia performance measurement for the purpose of a more realistic mobile WiMAX network test. Our work aims to make a contribution in better understanding the mobile WiMAX(More)
—Hash chains provide a secure and light way of security to data authentication including two aspects: Data Integrity and Data Origin Authentication. The real challenge of using the hash chains is how it could recover the synchronization state and continue keeping the hash link in case of packet loss? Based on the packet loss tolerance and some accepted(More)
  • 1