-
1
-
-
0019634370
-
Password authentication with insecure communication
-
Nov.
-
L. Lamport, "Password authentication with insecure communication"; Communications of the ACM, 24(11), Nov. 1981, pp.770-772.
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
2
-
-
33749679756
-
Chaining watermarks for detecting malicious modifications to streaming data
-
DOI 10.1016/j.ins.2006.03.014, PII S0020025506000855
-
Huiping Guo, Yingjiu Li, Sushil Jajodia; "Chaining watermarks for detecting malicious modifications to streaming data"; Information Sciences 177, 2007, pp.281-298. (Pubitemid 44556689)
-
(2007)
Information Sciences
, vol.177
, Issue.1
, pp. 281-298
-
-
Guo, H.1
Li, Y.2
Jajodia, S.3
-
3
-
-
26444506296
-
Efficient constructions for one-way hash chains
-
July
-
Yih-Chun Hu, M. Jakobsson and A. Perrig, "Efficient Constructions for One-Way Hash Chains", ANCS'05, July 2005.
-
(2005)
ANCS'05
-
-
Hu, Y.-C.1
Jakobsson, M.2
Perrig, A.3
-
5
-
-
0003629990
-
-
National Institute of Standards and Technology (NIST) Federal Information Processing Standards (FIPS) Publication 180-1, May
-
National Institute of Standards and Technology (NIST). Secure Hash Standard (SHA), Federal Information Processing Standards (FIPS) Publication 180-1, May 1993.
-
(1993)
Secure Hash Standard (SHA)
-
-
-
6
-
-
10644240754
-
A hybrid scheme for multicast authentication over lossy networks
-
H.K. Aslan; 'A hybrid scheme for multicast authentication over lossy networks'; Computers & Security 23, 2004, pp.705-713.
-
(2004)
Computers & Security
, vol.23
, pp. 705-713
-
-
Aslan, H.K.1
-
7
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
Rome, Italy
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, J. D. Tygar; "SPINS: Security Protocols for Sensor Networks", ACM Mobile Computing and Networking, Rome, Italy, 2001.
-
(2001)
ACM Mobile Computing and Networking
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
8
-
-
57849121129
-
A survey of RFID authentication protocols based on hash-chain method
-
11-13, Nov.
-
I. Syamsuddin; T. Dillon; E. Chang; S. Han; "A Survey of RFID Authentication Protocols Based on Hash-Chain Method"; Third International Conference on Convergence and Hybrid Information Technology ICCIT 08; Vol. 2, 11-13, Nov. 2008, pp.559 - 564.
-
(2008)
Third International Conference on Convergence and Hybrid Information Technology ICCIT 08
, vol.2
, pp. 559-564
-
-
Syamsuddin, I.1
Dillon, T.2
Chang, E.3
Han, S.4
-
9
-
-
57049109235
-
A study of micro-payment based on one-way hash chain
-
March
-
Min-Shiang Hwang and Pei-Chen Sung; "A Study of Micro-payment Based on One-Way Hash Chain"; International Journal of Network Security, Vol.2, No.2, pp.81-90, March 2006.
-
(2006)
International Journal of Network Security
, vol.2
, Issue.2
, pp. 81-90
-
-
Hwang, M.-S.1
Sung, P.-C.2
-
10
-
-
84889351757
-
How to Sign Digital Streams
-
Advances in Cryptology - CRYPTO '97
-
R. Gennaro and P. Rohatgi; "How to sign digital streams", In Proceedings of the Advances in Cryptology CRYPTO'97, 1997, pp. 180-197. (Pubitemid 127112552)
-
(1997)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1294
, pp. 180-197
-
-
Gennaro, R.1
Rohatgi, P.2
-
11
-
-
0033690336
-
Efficient authentication and signing of multicast streams over lossy channels
-
A. Perrig, R. Canetti, J. Tygar and D. Song, "Efficient authentication and signing of multicast streams over lossy channels," in Proc. of IEEE Symposium on Security and Privacy, pp. 56-73, 2000.
-
(2000)
Proc. of IEEE Symposium on Security and Privacy
, pp. 56-73
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.3
Song, D.4
-
14
-
-
2642515354
-
RTP payload format for MPEG-4 audio/visual streams
-
November
-
Y. Kikuchi, T. Nomura, S. Fukunaga, Y. Matsui, H. Kimata; "RTP Payload Format for MPEG-4 Audio/Visual Streams", RFC 3016, November 2000.
-
(2000)
RFC 3016
-
-
Kikuchi, Y.1
Nomura, T.2
Fukunaga, S.3
Matsui, Y.4
Kimata, H.5
-
15
-
-
77958476536
-
A framework for transmission of IP datagrams over MPEG-2 networks
-
November
-
M.-J. Montpetit, G. Fairhurst, H. Clausen, B. Collini-Nocker, H. Linder; "A Framework for Transmission of IP Datagrams over MPEG-2 Networks"; RFC 4259, November 2005.
-
(2005)
RFC 4259
-
-
Montpetit, M.-J.1
Fairhurst, G.2
Clausen, H.3
Collini-Nocker, B.4
Linder, H.5
-
16
-
-
79951742524
-
Electronic signature formats
-
September
-
Pinkas, et al.; "Electronic Signature Formats", RFC 3126, September 2001.
-
(2001)
RFC 3126
-
-
Pinkas1
-
17
-
-
0242674155
-
Diffie-hellman key agreement method
-
June
-
E. Rescorla, "Diffie-Hellman Key Agreement Method", RFC 2631, June 1999.
-
(1999)
RFC 2631
-
-
Rescorla, E.1
-
18
-
-
79951748002
-
Elliptic curve cryptography (ECC) cipher suites for transport layer security (TLS)
-
May
-
S. Blake-Wilson, N. Bolyard, V. Gupta, C. Hawk, B. Moeller; 'Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS)', RFC 4492, May 2006.
-
(2006)
RFC 4492
-
-
Blake-Wilson, S.1
Bolyard, N.2
Gupta, V.3
Hawk, C.4
Moeller, B.5
-
20
-
-
0017930809
-
METHOD FOR OBTAINING DIGITAL SIGNATURES AND PUBLIC-KEY CRYPTOSYSTEMS.
-
DOI 10.1145/359340.359342
-
R. Rivest; A. Shamir; L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems". Communications of the ACM 21 (2): 1978, pp.120-126. (Pubitemid 8591219)
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
21
-
-
70349653420
-
Time valid one-time signature for time-critical multicast data authentication
-
Q. Wang, H. Khurana, Y. Huang, K. Nahrstedt, "Time Valid One-Time Signature for Time-Critical Multicast Data Authentication", IEEE INFOCOM 2009, pp.1233-1241.
-
IEEE INFOCOM 2009
, pp. 1233-1241
-
-
Wang, Q.1
Khurana, H.2
Huang, Y.3
Nahrstedt, K.4
-
22
-
-
77951474210
-
Timed efficient stream loss-tolerant authentication (TESLA): Multicast source authentication transform introduction
-
June
-
A. Perrig, D. Song, R. Canetti, J. D. Tygar and B. Briscoe; "Timed Efficient Stream Loss-Tolerant Authentication (TESLA): Multicast Source Authentication Transform Introduction", RFC 4082, June 2005.
-
(2005)
RFC 4082
-
-
Perrig, A.1
Song, D.2
Canetti, R.3
Tygar, J.D.4
Briscoe, B.5
-
23
-
-
34547271142
-
Mobile application security for video streaming authentication and data integrity combining digital signature and watermarking techniques
-
DOI 10.1109/VETECS.2007.141, 4212569, 2007 IEEE 65th Vehicular Technology Conference - VTC2007-Spring
-
S. Chessa; R. Di Pietro; E. Ferro; G. Giunta; G. Oligeri; "Mobile Application Security for Video Streaming Authentication and Data Integrity Combining Digital Signature and Watermarking Techniques", Vehicular Technology Conference, 2007. VTC2007-Spring, IEEE 65th, 22-25 April 2007, pp.634 - 638. (Pubitemid 47134023)
-
(2007)
IEEE Vehicular Technology Conference
, pp. 634-638
-
-
Chessa, S.1
Di Pietro, R.2
Ferro, E.3
Giunta, G.4
Oligeri, G.5
-
24
-
-
79951761990
-
-
"Privacy at YouTube": http://www.youtube.com/t/privacy-at- youtube.
-
Privacy at YouTube
-
-
|