-
4
-
-
0032594123
-
Digital signatures for flows and multicasts
-
Aug.
-
C. K. Wong and S. Lam, "Digital signatures for flows and multicasts," IEEE/ACM Trans. Netw., vol. 7, no. 4, pp. 502-513, Aug. 1999.
-
(1999)
IEEE/ACM Trans. Netw.
, vol.7
, Issue.4
, pp. 502-513
-
-
Wong, C.K.1
Lam, S.2
-
5
-
-
0033280006
-
A compact and fast hybrid signature scheme for multicast packet authentication
-
P. Rohatgi, "A compact and fast hybrid signature scheme for multicast packet authentication," in Proc. 6th ACM Conf. Computer Communications Security, 1999, pp. 93-100.
-
(1999)
Proc. 6th ACM Conf. Computer Communications Security
, pp. 93-100
-
-
Rohatgi, P.1
-
6
-
-
0036079874
-
Efficient multicast packet authentication using signature amortization
-
J. M. Park, E. K. P. Chong, and H. J. Siegel, "Efficient multicast packet authentication using signature amortization," in Proc. IEEE Symp. Security Privacy, 2002, pp. 227-240.
-
(2002)
Proc. IEEE Symp. Security Privacy
, pp. 227-240
-
-
Park, J.M.1
Chong, E.K.P.2
Siegel, H.J.3
-
7
-
-
1542625909
-
Efficient multicast stream authentication using erasure codes
-
J. M. Park, E. K. P. Chong, and H. J. Siegel, "Efficient multicast stream authentication using erasure codes," ACM Trans. Information System Security, vol. 6, no. 2, pp. 258-285, 2003.
-
(2003)
ACM Trans. Information System Security
, vol.6
, Issue.2
, pp. 258-285
-
-
Park, J.M.1
Chong, E.K.P.2
Siegel, H.J.3
-
8
-
-
24944508408
-
Distillation codes and applications to dos resistant multicast authentication
-
C. Karlof, N. Sastry, Y. Li, A. Perrig, and D. Tygar, "Distillation codes and applications to dos resistant multicast authentication," in Proc. Network Distributed System Security Symp., 2004, pp. 37-56.
-
(2004)
Proc. Network Distributed System Security Symp.
, pp. 37-56
-
-
Karlof, C.1
Sastry, N.2
Li, Y.3
Perrig, A.4
Tygar, D.5
-
9
-
-
3543143146
-
Multicast authentication in fully adversarial networks
-
A. Lysyanskaya, R. Tamassia, and N. Triandopoulos, "Multicast authentication in fully adversarial networks," in Proc. IEEE Symp. Security Privacy, 2004, pp. 241-255.
-
(2004)
Proc. IEEE Symp. Security Privacy
, pp. 241-255
-
-
Lysyanskaya, A.1
Tamassia, R.2
Triandopoulos, N.3
-
10
-
-
0032661699
-
Multicast security: A taxonomy and some efficient constructions
-
R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas, "Multicast security: a taxonomy and some efficient constructions," in Proc. INFOCOMM. 1999, pp. 708-716.
-
(1999)
Proc. INFOCOMM
, pp. 708-716
-
-
Canetti, R.1
Garay, J.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
11
-
-
0035752112
-
The BiBa one-time signature and broadcast authentication protocol
-
Nov.
-
A. Perrig, "The BiBa one-time signature and broadcast authentication protocol," in Proc. 8th ACM Conf. Computer Communication Security, Nov. 2001, pp. 28-37.
-
(2001)
Proc. 8th ACM Conf. Computer Communication Security
, pp. 28-37
-
-
Perrig, A.1
-
12
-
-
0036040034
-
Authenticated multicast immune to denial-of-service attack
-
S. Xu and R. Sandhu, "Authenticated multicast immune to denial-of-service attack," in ACM Symp. Applied Computing, 2002, pp. 196-200.
-
(2002)
ACM Symp. Applied Computing
, pp. 196-200
-
-
Xu, S.1
Sandhu, R.2
-
13
-
-
0031383687
-
An efficient message authentication scheme for link state routing
-
Dec.
-
S. Cheung, "An efficient message authentication scheme for link state routing," in Proc. 13th Annu. Computer Security Applications Conf., Dec. 1997, pp. 90-98.
-
(1997)
Proc. 13th Annu. Computer Security Applications Conf.
, pp. 90-98
-
-
Cheung, S.1
-
14
-
-
0001989185
-
A new family of authentication protocols
-
R. Anderson, F. Bergadano, B. Crispo, J. Lee, C. Manifavas, and R. Needham, "A new family of authentication protocols," ACMOSR: ACM Operating Syst. Rev., vol. 32, no. 4, pp. 9-20, 1998.
-
(1998)
ACMOSR: ACM Operating Syst. Rev.
, vol.32
, Issue.4
, pp. 9-20
-
-
Anderson, R.1
Bergadano, F.2
Crispo, B.3
Lee, J.4
Manifavas, C.5
Needham, R.6
-
15
-
-
84949224321
-
Chained stream authentication
-
Aug.
-
F. Bergadano, D. Cavagnino, and B. Crispo, "Chained stream authentication," in Proc. 7th Annu. Workshop on Selected Areas in Cryptography, Aug. 2000, pp. 144-157.
-
(2000)
Proc. 7th Annu. Workshop on Selected Areas in Cryptography
, pp. 144-157
-
-
Bergadano, F.1
Cavagnino, D.2
Crispo, B.3
-
16
-
-
0034513710
-
Individual single source authentication on the mbone
-
Aug.
-
F. Bergadano, D. Cavagnino, and B. Crispo, "Individual single source authentication on the mbone," in Proc. IEEE Int. Conf. Mutlimedia Expo., Aug. 2000, pp. 541-544.
-
(2000)
Proc. IEEE Int. Conf. Mutlimedia Expo.
, pp. 541-544
-
-
Bergadano, F.1
Cavagnino, D.2
Crispo, B.3
-
17
-
-
33744722595
-
FLAMeS: Fast, loss-tolerant authentication of multicast streams
-
BT Research
-
B. Briscoe, FLAMeS: Fast, Loss-Tolerant Authentication of Multicast Streams, http://www.labs.bt.com., Tech. Rep., BT Research, 2000.
-
(2000)
Tech. Rep.
-
-
Briscoe, B.1
-
18
-
-
2342610452
-
TESLA: Multicast source authentication transform introduction
-
draft-ietf-msec-tesla-intro-01.txt
-
A. Perrig, R. Canetti, D. Song, J. D. Tygar, and B. Briscoe, "TESLA: multicast source authentication transform introduction," IETF Working Draft, draft-ietf-msec-tesla-intro-01.txt.
-
IETF Working Draft
-
-
Perrig, A.1
Canetti, R.2
Song, D.3
Tygar, J.D.4
Briscoe, B.5
-
19
-
-
15744368857
-
Efficient and secure source authentication for multicast
-
Feb.
-
A. Perrig, R. Canetti, D. Song, and J. D. Tygar, "Efficient and secure source authentication for multicast," in Proc. Network Distributed System Security Symp., Feb. 2001, pp. 35-46.
-
(2001)
Proc. Network Distributed System Security Symp.
, pp. 35-46
-
-
Perrig, A.1
Canetti, R.2
Song, D.3
Tygar, J.D.4
-
20
-
-
0242426103
-
The TESLA broadcast authentication protocol
-
A. Perrig, R. Canetti, J. D. Tygar, and D. Song, "The TESLA broadcast authentication protocol," RSA Cryptobytes, vol. 5, no. 2, pp. 2-13, 2002.
-
(2002)
RSA Cryptobytes
, vol.5
, Issue.2
, pp. 2-13
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.D.3
Song, D.4
-
21
-
-
0033690336
-
Efficient authentication and signing of multicast streams over lossy channels
-
A. Perrig, R. Canetti, J. D. Tygar, and D. Song, "Efficient authentication and signing of multicast streams over lossy channels," in Proc. IEEE Symp. Security Privacy, 2000, pp. 56-73.
-
(2000)
Proc. IEEE Symp. Security Privacy
, pp. 56-73
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.D.3
Song, D.4
-
23
-
-
0035510001
-
MPEG-4 and H.263 video traces for network performance evaluation
-
Nov./Dec.
-
F. H. P. Fitzek and M. Reisslein, "MPEG-4 and H.263 video traces for network performance evaluation," IEEE Netw., vol. 15, no. 6, pp. 40-54, Nov./Dec. 2001.
-
(2001)
IEEE Netw.
, vol.15
, Issue.6
, pp. 40-54
-
-
Fitzek, F.H.P.1
Reisslein, M.2
-
25
-
-
0038703640
-
Dv-based positioning in ad hoc networks
-
D. Niculescu and B. Nath, "Dv-based positioning in ad hoc networks," Telecommun. Syst., pp. 267-280, 2003.
-
(2003)
Telecommun. Syst.
, pp. 267-280
-
-
Niculescu, D.1
Nath, B.2
-
26
-
-
84948668912
-
Hysor: Group key management with collusion-scalability tradeoffs using a hybrid structuring of receivers
-
J. Fan, P. Judge, and M. H., "Hysor: group key management with collusion-scalability tradeoffs using a hybrid structuring of receivers," in Proc. 11th Int. Conf. Computer Communications Networks, 2002, pp. 196-201.
-
(2002)
Proc. 11th Int. Conf. Computer Communications Networks
, pp. 196-201
-
-
Fan, J.1
Judge, P.2
H., M.3
-
27
-
-
4544310181
-
A secure multicast protocol with copyright protection
-
H. Chu, L. Qiao, K. Nahrstedt, and H. Wang, "A secure multicast protocol with copyright protection," ACM Comput. Commun. Rev. J., vol. 32, pp. 42-60, 2002.
-
(2002)
ACM Comput. Commun. Rev. J.
, vol.32
, pp. 42-60
-
-
Chu, H.1
Qiao, L.2
Nahrstedt, K.3
Wang, H.4
-
28
-
-
84858892210
-
Network time protocol (version 3) specification, implementation and analysis
-
D. Mills, "Network Time Protocol (Version 3) Specification, Implementation and Analysis," IETF RFC [Online]. Available: http://www.ietf.org/rfc/rfc1305.txt
-
IETF RFC [Online]
-
-
Mills, D.1
|