메뉴 건너뛰기




Volumn 6056 LNCS, Issue , 2010, Pages 142-160

Secure network coding over the integers

Author keywords

[No Author keywords available]

Indexed keywords

CENTRALIZED CONTROL; COMMUNICATION OVERHEADS; DATA PACKET; INTERMEDIATE NODE; MALICIOUS NODES; MESSAGE RECOVERY; POLLUTION ATTACK; RANDOM ORACLE MODEL; RSA ASSUMPTION; SECURE NETWORKS; SIGNATURE GENERATION; SIGNATURE SCHEME; THE STANDARD MODEL;

EID: 78649897589     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-13013-7_9     Document Type: Conference Paper
Times cited : (127)

References (21)
  • 1
    • 68849097857 scopus 로고    scopus 로고
    • Homomorphic MACs: MAC-based integrity for network coding
    • Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.). Springer, Heidelberg
    • Agrawal, S., Boneh, D.: Homomorphic MACs: MAC-based integrity for network coding. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol. 5536. Springer, Heidelberg (2009)
    • (2009) ACNS 2009. LNCS , vol.5536
    • Agrawal, S.1    Boneh, D.2
  • 4
    • 72449185582 scopus 로고    scopus 로고
    • Proofs of storage from homomorphic identification protocols
    • Matsui, M. (ed.). Springer, Heidelberg
    • Ateniese, G., Kamara, S., Katz, J.: Proofs of storage from homomorphic identification protocols. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 319-333. Springer, Heidelberg (2009)
    • (2009) ASIACRYPT 2009. LNCS , vol.5912 , pp. 319-333
    • Ateniese, G.1    Kamara, S.2    Katz, J.3
  • 5
    • 50849114523 scopus 로고    scopus 로고
    • Fast batch verification for modular exponentiation and digital signatures
    • Advances in Cryptology - EUROCRYPT '98
    • Bellare, M., Garay, J., Rabin, T.: Fast batch verification for modular exponentiation and digital signatures. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 236-250. Springer, Heidelberg (1998) (Pubitemid 128081489)
    • (1998) Lecture Notes in Computer Science , Issue.1403 , pp. 236-250
    • Bellare, M.1    Garay, J.A.2    Rabin, T.3
  • 6
    • 67049095592 scopus 로고    scopus 로고
    • Signing a linear subspace: Signature schemes for network coding
    • Jarecki, S., Tsudik, G. (eds.). Springer, Heidelberg
    • Boneh, D., Freeman, D., Katz, J., Waters, B.: Signing a linear subspace: Signature schemes for network coding. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 68-87. Springer, Heidelberg (2009)
    • (2009) PKC 2009. LNCS , vol.5443 , pp. 68-87
    • Boneh, D.1    Freeman, D.2    Katz, J.3    Waters, B.4
  • 7
    • 44049100993 scopus 로고    scopus 로고
    • Signatures for network coding
    • 40th Annual Conference on Information Sciences and Systems, CISS 2006, To appear in
    • Charles, D., Jain, K., Lauter, K.: Signatures for network coding. In: 40th Annual Conference on Information Sciences and Systems, CISS 2006 (2006); To appear in International Journal of Information and Coding Theory
    • (2006) International Journal of Information and Coding Theory
    • Charles, D.1    Jain, K.2    Lauter, K.3
  • 9
    • 39049090594 scopus 로고    scopus 로고
    • Cooperative security for network coding file distribution
    • Gkantsidis, C., Rodriguez, P.: Cooperative security for network coding file distribution. In: Proc. of IEEE INFOCOM 2006, pp. 1-13 (2006)
    • (2006) Proc. of IEEE INFOCOM 2006 , pp. 1-13
    • Gkantsidis, C.1    Rodriguez, P.2
  • 16
    • 84944905011 scopus 로고    scopus 로고
    • Homomorphic signature schemes
    • Preneel, B. (ed.). Springer, Heidelberg
    • Johnson, R., Molnar, D., Song, D., Wagner, D.: Homomorphic signature schemes. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, pp. 244-262. Springer, Heidelberg (2002)
    • (2002) CT-RSA 2002. LNCS , vol.2271 , pp. 244-262
    • Johnson, R.1    Molnar, D.2    Song, D.3    Wagner, D.4
  • 17
    • 3543050732 scopus 로고    scopus 로고
    • On the-fly verification of rateless erasure codes for efficient content distribution
    • Krohn, M., Freedman, M., Mazieres, D.: On the-fly verification of rateless erasure codes for efficient content distribution. In: Proc. IEEE Symposium on Security & Privacy, pp. 226-240 (2004)
    • (2004) Proc. IEEE Symposium on Security & Privacy , pp. 226-240
    • Krohn, M.1    Freedman, M.2    Mazieres, D.3
  • 19
    • 58349118819 scopus 로고    scopus 로고
    • Compact proofs of retrievability
    • Pieprzyk, J. (ed.). Springer, Heidelberg
    • Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 90-107. Springer, Heidelberg (2008)
    • (2008) ASIACRYPT 2008. LNCS , vol.5350 , pp. 90-107
    • Shacham, H.1    Waters, B.2
  • 20
    • 51349130622 scopus 로고    scopus 로고
    • An efficient signature-based scheme for securing network coding against pollution attacks
    • Yu, Z., Wei, Y., Ramkumar, B., Guan, Y.: An efficient signature-based scheme for securing network coding against pollution attacks. In: INFOCOM (2008)
    • (2008) INFOCOM
    • Yu, Z.1    Wei, Y.2    Ramkumar, B.3    Guan, Y.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.