메뉴 건너뛰기




Volumn , Issue , 2000, Pages 56-73

Efficient authentication and signing of multicast streams over lossy channels

Author keywords

[No Author keywords available]

Indexed keywords

COMMUNICATION CHANNELS (INFORMATION THEORY); DATA COMMUNICATION SYSTEMS; INTERNET; MULTICASTING; PACKET SWITCHING; RADIO BROADCASTING; SATELLITE COMMUNICATION SYSTEMS; TELEVISION BROADCASTING;

EID: 0033690336     PISSN: 10637109     EISSN: None     Source Type: Journal    
DOI: 10.1109/SECPRI.2000.848446     Document Type: Article
Times cited : (797)

References (32)
  • 2
    • 84983089516 scopus 로고
    • The security of cipher block chaining
    • M. Bellare J. Kilian P. Rogaway The security of cipher block chaining Advances in Cryptology-Crypto '94 839 341 358 Advances in Cryptology-Crypto '94 Berlin 1994
    • (1994) , vol.839 , pp. 341-358
    • Bellare, M.1    Kilian, J.2    Rogaway, P.3
  • 3
    • 0005343811 scopus 로고    scopus 로고
    • Collision-resistant hashing: Towards making UOWHFs practical
    • M. Bellare P. Rogaway Collision-resistant hashing: Towards making UOWHFs practical Advances in Cryptology-Crypto '97 1294 470 484 Advances in Cryptology-Crypto '97 Berlin 1997
    • (1997) , vol.1294 , pp. 470-484
    • Bellare, M.1    Rogaway, P.2
  • 4
  • 5
    • 84944709504 scopus 로고
    • A Security Analysis of the NTP Protocol Version 2
    • M. Bishop A Security Analysis of the NTP Protocol Version 2 Sixth Annual Computer Security Applications Conference Sixth Annual Computer Security Applications Conference 1990-November
    • (1990)
    • Bishop, M.1
  • 6
    • 0001939948 scopus 로고    scopus 로고
    • Internet packet loss: Measurement and implications for end-to-end qos
    • M. Borella D. Swider S. Uludag G. Brewster Internet packet loss: Measurement and implications for end-to-end qos International Conference on Parallel Processing International Conference on Parallel Processing 1998-August
    • (1998)
    • Borella, M.1    Swider, D.2    Uludag, S.3    Brewster, G.4
  • 8
    • 0018456171 scopus 로고
    • Universal classes of hash functions
    • J. L. Carter M. N. Wegman Universal classes of hash functions JCSS No. 18 18 143 154 1979
    • (1979) JCSS No. 18 , Issue.18 , pp. 143-154
    • Carter, J.L.1    Wegman, M.N.2
  • 9
    • 85027170783 scopus 로고
    • Architectural considerations for a new generation of protocols
    • D. D. Clark D. L. Tennenhouse Architectural considerations for a new generation of protocols Proceedings of the ACM symposium on Communications architectures and protocols SIGCOMM '90 200 208 Proceedings of the ACM symposium on Communications architectures and protocols SIGCOMM '90 1990-September-26-28
    • (1990) , pp. 200-208
    • Clark, D.D.1    Tennenhouse, D.L.2
  • 10
    • 85177133017 scopus 로고    scopus 로고
    • Cryptix http://www.cryptix.org
  • 11
    • 33645772149 scopus 로고
    • Multicast Routing in Internetworks and Extended LANs
    • S. E. Deering Multicast Routing in Internetworks and Extended LANs Proceedings of ACM SIGCOMM '88 Proceedings of ACM SIGCOMM '88 1988-August
    • (1988)
    • Deering, S.E.1
  • 12
    • 0004035649 scopus 로고    scopus 로고
    • The TLS protocol version 1.0
    • T. Dierks C. Allen The TLS protocol version 1.0 January 1999 RFC 2246
    • (1999)
    • Dierks, T.1    Allen, C.2
  • 13
    • 17844362127 scopus 로고    scopus 로고
    • How to Sign Digital Streams
    • R. Gennaro P. Rohatgi How to Sign Digital Streams 1997 IBM T.J.Watson Research Center
    • (1997)
    • Gennaro, R.1    Rohatgi, P.2
  • 14
    • 85177124513 scopus 로고    scopus 로고
    • O. Goldreich Foundations of cryptography (fragments of a book) 1998 http://www.toc.lcs.mit. edu/\~oded/frag.html
    • (1998)
    • Goldreich, O.1
  • 15
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • S. Goldwasser S. Micali R. Rivest A digital signature scheme secure against adaptive chosen-message attacks SIAM Journal of Computing 17 2 281 308 April 1988
    • (1988) SIAM Journal of Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 16
    • 85177113909 scopus 로고    scopus 로고
    • M. Handley Private communication with Adrian Perrig February 2000
    • (2000)
    • Handley, M.1
  • 17
    • 85177137144 scopus 로고    scopus 로고
    • Java web page IBM http://www.ibm.com/developer/java
  • 18
    • 85177127421 scopus 로고    scopus 로고
    • Ipsec. IP Security Protocol IETF working group http://www.ietf.org/html.charters/ipsec—charter.html
  • 20
    • 84969346266 scopus 로고
    • A certified digital signature
    • R. C. Merkle A certified digital signature Advances in Cryptology-Crypto '89 435 218 238 Advances in Cryptology-Crypto '89 Berlin 1989
    • (1989) , vol.435 , pp. 218-238
    • Merkle, R.C.1
  • 21
    • 0009554659 scopus 로고
    • Protocols for public key cryptosystems
    • R. Merkle Protocols for public key cryptosystems 1980 IEEE Symposium on Security and Privacy 1980 IEEE Symposium on Security and Privacy 1980
    • (1980)
    • Merkle, R.1
  • 22
    • 0003871309 scopus 로고
    • Network Time Protocol (Version 3) Specification, Implementation and Analysis
    • D. L. Mills Network Time Protocol (Version 3) Specification, Implementation and Analysis March 1992 RFC 1305
    • (1992)
    • Mills, D.L.1
  • 23
    • 85177108775 scopus 로고
    • Universal one-way hash functions and their cryptographic applications
    • M. Naor M. Yung Universal one-way hash functions and their cryptographic applications Proceedings of the Twenty First Annual ACM Symposium on Theory of Computing (STOC '89) Proceedings of the Twenty First Annual ACM Symposium on Theory of Computing (STOC '89) 1989
    • (1989)
    • Naor, M.1    Yung, M.2
  • 24
    • 0032677326 scopus 로고    scopus 로고
    • End-to-end internet packet dynamics
    • V. Paxson End-to-end internet packet dynamics IEEE/ACM Transactions on Networking 7 3 277 292 June 1999
    • (1999) IEEE/ACM Transactions on Networking , vol.7 , Issue.3 , pp. 277-292
    • Paxson, V.1
  • 26
    • 0003602325 scopus 로고
    • The MD5 message-digest algorithm
    • R. L. Rivest The MD5 message-digest algorithm April 1992 RFC 1321
    • (1992)
    • Rivest, R.L.1
  • 27
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. L. Rivest A. Shamir L. M. Adleman A method for obtaining digital signatures and public-key cryptosystems Communications of the ACM 21 2 120 126 1978
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 28
    • 85177128394 scopus 로고    scopus 로고
    • A compact and fast hybrid signature scheme for multicast packet authentication
    • P. Rohatgi A compact and fast hybrid signature scheme for multicast packet authentication 6th ACM Conference on Computer and Communications Security 6th ACM Conference on Computer and Communications Security 1999-November
    • (1999)
    • Rohatgi, P.1
  • 29
    • 85177120773 scopus 로고    scopus 로고
    • Secure Multicast User Group (SMUG) http://www.ipmulticast.com/community/smug/
  • 30
    • 69949120749 scopus 로고    scopus 로고
    • Unlinkable serial transactions
    • P. F. Syverson S. G. Stubblebine D. M. Goldschlag Unlinkable serial transactions Financial Cryptography '97 1318 Financial Cryptography '97 1997
    • (1997) , vol.1318
    • Syverson, P.F.1    Stubblebine, S.G.2    Goldschlag, D.M.3
  • 31
    • 0003976197 scopus 로고    scopus 로고
    • Digital signatures for flows and multicasts
    • C. K. Wong S. S. Lam Digital signatures for flows and multicasts Proc. IEEE ICNP '98 Proc. IEEE ICNP '98 1998
    • (1998)
    • Wong, C.K.1    Lam, S.S.2
  • 32
    • 30144443511 scopus 로고    scopus 로고
    • Measurement and modelling of the temporal dependence in packet loss
    • NY
    • M. Yajnik S. Moon J. Kurose D. Towsley Measurement and modelling of the temporal dependence in packet loss IEEE INFOCOM '99 IEEE INFOCOM '99 New York NY 1999-March
    • (1999)
    • Yajnik, M.1    Moon, S.2    Kurose, J.3    Towsley, D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.