메뉴 건너뛰기




Volumn , Issue , 2008, Pages 2083-2091

An efficient signature-based scheme for securing network coding against pollution attacks

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATION EFFICIENCY; NETWORK CODING;

EID: 51349130622     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFOCOM.2007.199     Document Type: Conference Paper
Times cited : (173)

References (24)
  • 2
    • 84937428623 scopus 로고    scopus 로고
    • Efficient Algorithms for Pairing-Based Cryptosystems
    • Proc. 22nd Annual International Cryptology Conference on Advances in Cryptology
    • P. Barreto, H. Kim, B. Lynn, and M. Scott, "Efficient Algorithms for Pairing-Based Cryptosystems", in Proc. 22nd Annual International Cryptology Conference on Advances in Cryptology, LNCS, Vol. 2442, pp. 354-368, 2002.
    • (2002) LNCS , vol.2442 , pp. 354-368
    • Barreto, P.1    Kim, H.2    Lynn, B.3    Scott, M.4
  • 3
    • 50849114523 scopus 로고    scopus 로고
    • Fast Batch Verification for Modular Exponentiation and Digital Signatures
    • Proc. Advances in Cryptology EUROCRYPT'98
    • M. Bellare, J. Garay. and T. Rabin, "Fast Batch Verification for Modular Exponentiation and Digital Signatures", in Proc. Advances in Cryptology (EUROCRYPT'98), LNCS, Vol. 1403, pp. 236-250, 1998.
    • (1998) LNCS , vol.1403 , pp. 236-250
    • Bellare, M.1    Garay, J.2    Rabin, T.3
  • 4
    • 51349135448 scopus 로고    scopus 로고
    • Signature for Network Coding
    • MSR-TR-2005-159, Microsoft, 2005
    • D. Charles, K. Jian, and K. Lauter, "Signature for Network Coding". Technique Report MSR-TR-2005-159, Microsoft, 2005.
    • Technique Report
    • Charles, D.1    Jian, K.2    Lauter, K.3
  • 7
    • 82955246861 scopus 로고    scopus 로고
    • Implementing the Tate Pairing
    • Proc. 5th Algorithmic Number Theory Symposium ANTS V
    • S. Galbraith. K. Harrison, and D. Soldera, "Implementing the Tate Pairing", in Proc. 5th Algorithmic Number Theory Symposium (ANTS V). LNCS, Vol. 2369, pp. 324-337, 2002.
    • (2002) LNCS , vol.2369 , pp. 324-337
    • Galbraith, S.1    Harrison, K.2    Soldera, D.3
  • 8
  • 9
    • 39049090594 scopus 로고    scopus 로고
    • Cooperative Security for Network Coding File Distribution
    • C. Gkantsidis and P. Rodriguez. "Cooperative Security for Network Coding File Distribution", in Proc. IEEE INFOCOM, 2006.
    • (2006) Proc. IEEE INFOCOM
    • Gkantsidis, C.1    Rodriguez, P.2
  • 14
    • 84958550160 scopus 로고    scopus 로고
    • The Weil and Tate Pairings as Building Blocks for Public Key Cryptosystems
    • Proc. 5th Algorithmic Number Theory Symposium ANTS V
    • A. Joux, "The Weil and Tate Pairings as Building Blocks for Public Key Cryptosystems". in Proc. 5th Algorithmic Number Theory Symposium (ANTS V), LNCS, Vol. 2369, pp. 20-32, 2002.
    • (2002) LNCS , vol.2369 , pp. 20-32
    • Joux, A.1
  • 17
    • 0027662341 scopus 로고
    • Reducing Elliptic Curve Logorithms to Logorithms in a Finite Field
    • A. Menezes, T. Okamoto, and S. Vanstone, "Reducing Elliptic Curve Logorithms to Logorithms in a Finite Field", in IEEE Transactions on Information Theory, Vol 39, No. 5, pp. 1639-1646, 1993.
    • (1993) IEEE Transactions on Information Theory , vol.39 , Issue.5 , pp. 1639-1646
    • Menezes, A.1    Okamoto, T.2    Vanstone, S.3
  • 18
    • 0038763879 scopus 로고
    • Short Programs for Functions over Curve
    • unpublished manuscript
    • V. Miller, "Short Programs for Functions over Curve", unpublished manuscript, http://crypto.stanford.edu/miller/miller.pdf, 1986.
    • (1986)
    • Miller, V.1
  • 20
    • 33745161352 scopus 로고    scopus 로고
    • Overcoming Untuned Radios in Wireless Networks with Network Coding
    • D. Petrovic, K. Ramchandran. and J. Rabaey. "Overcoming Untuned Radios in Wireless Networks with Network Coding", in IEEE Transactions on Information Theory, Vol 52, No. 6, pp. 2649-2657. 2006.
    • (2006) IEEE Transactions on Information Theory , vol.52 , Issue.6 , pp. 2649-2657
    • Petrovic, D.1    Ramchandran, K.2    Rabaey, J.3
  • 21
    • 0036983290 scopus 로고    scopus 로고
    • S. Ratnasamy, B. karp. L. Yin, F. Yu, D. Estrin, R. Govindan and S. Shenker. GHT: A Orographic Hash Table for Data-Centric Storage, in Proc. 1st ACM International Workshop on Wireless Sensor Networks and Applications, (WSNA '02). pp. 78-87, 2002.
    • S. Ratnasamy, B. karp. L. Yin, F. Yu, D. Estrin, R. Govindan and S. Shenker. "GHT: A Orographic Hash Table for Data-Centric Storage", in Proc. 1st ACM International Workshop on Wireless Sensor Networks and Applications, (WSNA '02). pp. 78-87, 2002.
  • 22
    • 51349118159 scopus 로고    scopus 로고
    • W. Stallings, Cryptography and Network Security: Principles and Practice, Second Edition, Prentice Hall
    • W. Stallings, Cryptography and Network Security: Principles and Practice, Second Edition, Prentice Hall.
  • 24
    • 35348853638 scopus 로고    scopus 로고
    • Efficient Implementation of Public Key Cryptosystems on MicaZ and TelosB Motes
    • Technical Report WM-CS-2006, College of William and Mary
    • H. Wang and Q. Li, "Efficient Implementation of Public Key Cryptosystems on MicaZ and TelosB Motes". Technical Report WM-CS-2006, College of William and Mary, 2006.
    • (2006)
    • Wang, H.1    Li, Q.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.