메뉴 건너뛰기




Volumn 100, Issue , 2002, Pages 41-55

AUTHENTICATION OF TRANSIT FLOWS AND K-SIBLINGS ONE-TIME SIGNATURE

Author keywords

k sibling hashing; Network security; one time signatures; source authentication

Indexed keywords

AUTHENTICATION;

EID: 35248849687     PISSN: 18684238     EISSN: 1868422X     Source Type: Book Series    
DOI: 10.1007/978-0-387-35612-9_5     Document Type: Article
Times cited : (2)

References (18)
  • 3
    • 85175180620 scopus 로고    scopus 로고
    • Efficient Authentication and Signing of Multicast Streams over Lossy Channels
    • A. Perrig, R. Canetti, J.D. Tygar, D. Song, " Efficient Authentication and Signing of Multicast Streams over Lossy Channels", ACM CCS'02, 2000.
    • (2000) ACM CCS'02
    • Perrig, A.1    Canetti, R.2    Tygar, J.D.3    Song, D.4
  • 5
    • 85175172124 scopus 로고    scopus 로고
    • The BiBa One-Time Signature and Broadcast Authentication Protocol
    • A. Perrigo "The BiBa One-Time Signature and Broadcast Authentication Protocol". ACM, CCS'OI, Philadelphia, November 2001.
    • (2001) . ACM, CCS'OI, Philadelphia
    • Perrigo, A.1
  • 8
    • 0027342095 scopus 로고
    • The sibling intractable function family(SIFF): Notion, construction and applications
    • Y. Zheng, T. Hardjono and J. Pieprzyk. "The sibling intractable function family(SIFF): notion, construction and applications. IElCE 7rans. Jilundamentals, vol. E76-A:4-13, January 1993.
    • (1993) Ielce 7Rans. Jilundamentals , vol.76
    • Zheng, Y.1    Hardjono, T.2    Pieprzyk, J.3
  • 9
    • 35248822497 scopus 로고    scopus 로고
    • Verifiable secret sharing
    • Lecture Notes in Computer Science No. 1787. Springer-Verlag
    • J. Pieprzyk and E. Okamato. " Verifiable secret sharing", IClSC'99, Seoul, Korea, pages 169-183, Lecture Notes in Computer Science No. 1787. Springer-Verlag 1999.
    • (1999) Iclsc'99, Seoul, Korea , pp. 169-183
    • Pieprzyk, J.1    Okamato, E.2
  • 10
    • 84969346266 scopus 로고
    • A Certified Digital Signature
    • Lecture Notes in Computer Science No. 435
    • R. Merkle. "A Certified Digital Signature", Advances in Cryptology-CRYPTO'89, pages 218-238 Springer-Verlag, 1989. Lecture Notes in Computer Science No. 435.
    • (1989) Advances in Cryptology-Crypto'89 , pp. 218-238
    • Merkle, R.1
  • 12
    • 85175178060 scopus 로고    scopus 로고
    • RFC 2401: Security architecture for the Internet Security
    • S. Kent and R. Atkinson. RFC 2401: Security architecture for the Internet Security. Networking Group, IETF, November 1998. http://www.ietf.org.
    • (1998) Networking Group, IETF
    • Kent, S.1    Atkinson, R.2
  • 13
    • 0023985465 scopus 로고
    • A Digital signature Scheme Secure Aagainst Adaptive Chosen-message Attacks"
    • S. Goldwasser, S. Micai, and C. Rackoff, "A Digital signature Scheme Secure Aagainst Adaptive Chosen-message Attacks", SIAM Journal on Computing, 17 (1988).
    • (1988) SIAM Journal on Computing , vol.17
    • Goldwasser, S.1    Micai, S.2    Rackoff, C.3
  • 16
    • 0018545449 scopus 로고
    • How to share a secret
    • November
    • A. Shamir, "How to share a secret", Communications the ACM, 22:612-613, November 1979.
    • (1979) Communications the ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 17
    • 0022793132 scopus 로고
    • How to construct random functions
    • October
    • Oded Goldreich, Shaft Goldwasser, and Silvio Micali, " How to construct random functions", Journal 01 the ACM, 33(4):792-807, October 1986.
    • (1986) Journal 01 the ACM , vol.33 , Issue.4 , pp. 792-807
    • Goldreich, O.1    Goldwasser, S.2    Micali, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.