L. Lamport, Password authentication with insecure communication, Communications of the ACM, vol.24, issue.11, pp.770-772, 1981.
DOI : 10.1145/358790.358797

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

H. Guo and Y. Li, Sushil Jajodia Chaining watermarks for detecting malicious modifications to streaming data'; Information Sciences 177, pp.281-298, 2007.
DOI : 10.1016/j.ins.2006.03.014

Y. Hu, M. Jakobsson, and A. Perrig, Efficient Constructions for One-Way Hash Chains, ANCS'05, 2005.
DOI : 10.1007/11496137_29

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

R. L. Rivest, The MD5 message-digest algorithm, 1992.
DOI : 10.17487/rfc1321

K. Heba and . Aslan, A hybrid scheme for multicast authentication over lossy networks'; Computers & Security 23, pp.705-713, 2004.

A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar, SPINS, Proceedings of the 7th annual international conference on Mobile computing and networking , MobiCom '01, 2001.
DOI : 10.1145/381677.381696

I. Syamsuddin, T. Dillon, and E. Chang, Song Han; 'A Survey of RFID Authentication Protocols Based on Hash-Chain Method, Third International Conference on Convergence and Hybrid Information Technology ICCIT 08, pp.11-13559, 2008.

H. Guo and Y. Li, Sushil Jajodia; 'Chaining watermarks for detecting malicious modifications to streaming data'; Information Sciences, pp.281-298, 2007.
DOI : 10.1016/j.ins.2006.03.014

M. Hwang and P. Sung, A Study of Micropayment Based on One-Way Hash Chain', International Journal of Network Security, vol.2, issue.2, pp.81-90, 2006.

Y. Liu, L. Hu, and H. Liu, Using an efficient hash chain and delaying function to improve an e-lottery scheme, International Journal of Computer Mathematics, vol.84, issue.7, pp.967-970, 2007.
DOI : 10.1007/BFb0055485

Y. Challal, A. Bouabdallah, and Y. Hinard, RLH: receiver driven layered hash-chaining for multicast data origin authentication'; Computer Communications 28, pp.726-740, 2005.

R. Gennaro and P. Rohatgi, How to sign digital streams, Proceedings of the Advances in Cryptology CRYPTO'97, pp.180-197, 1997.

Z. , Z. Apostolopoulos, J. Sun, Q. Wee, S. And-wong et al., Stream authentication based on generalized butterfly graph, Proceedings of the IEEE International Conference on Image Processing (ICIP'07), pp.121-124, 2007.

A. Perrig, R. Canetti, J. Tygar, and D. Song, Efficient authentication and signing of multicast streams over lossy channels, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, pp.56-73, 2000.
DOI : 10.1109/SECPRI.2000.848446

P. Golle and N. Modadugu, Authentication streamed data in the presence of random packet loss, ISOC Network and Distributed System Security Symposium, pp.13-22, 2001.

A. Emad, Afifi Hossam Optimization of File Allocation for Video Sharing Servers, NTMS 3 rd IEEE International Conference, pp.1-5, 2009.

Y. Kikuchi, T. Nomura, S. Fukunaga, Y. Matsui, and H. Kimata, RTP Payload Format for MPEG-4 Audio/Visual Streams, 2000.
DOI : 10.17487/rfc3016

M. Montpetit, G. Fairhurst, H. Clausen, B. Collini-nocker, and H. Linder, A Framework for Transmission of IP Datagrams over MPEG-2 Networks ' ; RFC 4259, 2005.

. Pinkas, Electronic Signature Formats, 2001.

E. Rescorla, Diffie-Hellman Key Agreement Method', RFC 2631, 1999.