-
1
-
-
84945118556
-
Lower bounds for multicast message authentication
-
B. Pfitzmann, editor. Springer Verlag
-
D. Boneh, G. Durfee, and M. Franklin. Lower bounds for multicast message authentication. In B. Pfitzmann, editor, Advances in Cryptology - EUROCRYPT 2001, volume 2045 of Lecture Notes in Computer Science, pages 437-452. Springer Verlag, 2001.
-
(2001)
Advances in Cryptology - EUROCRYPT 2001, Volume 2045 of Lecture Notes in Computer Science
, vol.2045
, pp. 437-452
-
-
Boneh, D.1
Durfee, G.2
Franklin, M.3
-
2
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
J. Kilian, editor. Springer Verlag
-
D. Boneh and M. Franklin. Identity-based encryption from the Weil pairing. In J. Kilian, editor, Advances in Cryptology - CRYPTO 2001, volume 2139 of Lecture Notes in Computer Science, pages 213-229. Springer Verlag, 2001.
-
(2001)
Advances in Cryptology - CRYPTO 2001, Volume 2139 of Lecture Notes in Computer Science
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
3
-
-
84946840347
-
Short signatures from the weil pairing
-
Springer-Verlag
-
D. Boneh, B. Lynn, and H. Shacham. Short signatures from the Weil pairing. In Advances in Cryptology, ASIACRYPT 2001, volume 2248 of Lecture Notes in Computer Science, pages 514-532. Springer-Verlag, 2001.
-
(2001)
Advances in Cryptology, ASIACRYPT 2001, Volume 2248 of Lecture Notes in Computer Science
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
4
-
-
0032661699
-
Multicast security: A taxonomy and some efficient constructions
-
R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas. Multicast security: A taxonomy and some efficient constructions. In IEEE INFOCOM, pages 708-716, 1999.
-
(1999)
IEEE INFOCOM
, pp. 708-716
-
-
Canetti, R.1
Garay, J.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
8
-
-
0026992399
-
Multi-receiver/multi-sender network security: Efficient authenticated multi-cast/feedback
-
IEEE-Press
-
Y. Desmedt, Y. Frankel, and M. Yung. Multi-receiver/multi-sender network security: Efficient authenticated multi-cast/feedback. In IEEE Conference on Computer Communications - INFOCOM '92, pages 2045-2054. IEEE-Press, 1992.
-
(1992)
IEEE Conference on Computer Communications - INFOCOM '92
, pp. 2045-2054
-
-
Desmedt, Y.1
Frankel, Y.2
Yung, M.3
-
10
-
-
84889351757
-
How to sign digital streams
-
B. Kaliski, editor. Springer Verlag
-
R. Gennaro and P. Rohatgi. How to sign digital streams. In B. Kaliski, editor, Advances in Cryptology - CRYPTO '97, volume 1294 of Lecture Notes in Computer Science, pages 180-197. Springer Verlag, 1997.
-
(1997)
Advances in Cryptology - CRYPTO '97, Volume 1294 of Lecture Notes in Computer Science
, vol.1294
, pp. 180-197
-
-
Gennaro, R.1
Rohatgi, P.2
-
11
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
Apr.
-
S. Goldwasser, S. Micali, and R. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing, 17(2):281-308, Apr. 1988.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
17
-
-
0030671783
-
Practical loss-resilient codes
-
M. G. Luby, M. Mitzenmacher, M. A. Shokrollahi, D. A. Spielman, and V. Stemann. Practical loss-resilient codes. In 29th Annual ACM Symposium on Theory of Computing (STOC '97), pages 150-159, 1997.
-
(1997)
29th Annual ACM Symposium on Theory of Computing (STOC '97)
, pp. 150-159
-
-
Luby, M.G.1
Mitzenmacher, M.2
Shokrollahi, M.A.3
Spielman, D.A.4
Stemann, V.5
-
22
-
-
0033690336
-
Efficient authentication and signing of multicast stream over lossy channels
-
A. Perrig, R. Canetti, J. Tygar, and D. Song. Efficient authentication and signing of multicast stream over lossy channels. In IEEE Symposium on Security and Privacy, pages 56-73, 2000.
-
(2000)
IEEE Symposium on Security and Privacy
, pp. 56-73
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.3
Song, D.4
-
23
-
-
0024641589
-
Efficient dispersal of information for security, load balancing, and fault tolerance
-
M. O. Rabin, Efficient dispersal of information for security, load balancing, and fault tolerance. Journal of ACM, 36(2):335-348, 1989.
-
(1989)
Journal of ACM
, vol.36
, Issue.2
, pp. 335-348
-
-
Rabin, M.O.1
-
26
-
-
84983269168
-
Authentication theory/coding theory
-
(Santa Barbara, CA) LNCS 196, Springer-Verlag
-
G. J. Simmons. Authentication theory/coding theory. In Proceedings of the Conference on Advances in Cryptology (CRYPTO'84, Santa Barbara, CA), LNCS 196, Springer-Verlag, pages 411-431, 1984.
-
(1984)
Proceedings of the Conference on Advances in Cryptology CRYPTO'84
, pp. 411-431
-
-
Simmons, G.J.1
-
27
-
-
0036079991
-
Expander graphs for digital stream authentication and robust overlay networks
-
D. Song, D. Zuckerman, and J. D. Tygar. Expander graphs for digital stream authentication and robust overlay networks. In IEEE Symposium on Security and Privacy, pages 258-27, 2002.
-
(2002)
IEEE Symposium on Security and Privacy
, pp. 258-327
-
-
Song, D.1
Zuckerman, D.2
Tygar, J.D.3
-
29
-
-
0036040034
-
Authenticated multicast immune to denial-of-service attack
-
Madrid, Spain, Mar.
-
S. Xu and R. Sandhu. Authenticated multicast immune to denial-of-service attack. In Proc. ACM Symposium on Applied Computing, pages 196-200, Madrid, Spain, Mar. 2002.
-
(2002)
Proc. ACM Symposium on Applied Computing
, pp. 196-200
-
-
Xu, S.1
Sandhu, R.2
|