-
1
-
-
84957068240
-
UMAC: fast and secure message authen-tication
-
LNCS 1666 Springer-Verlag Berlin
-
J. Black, S. Halevi, H. Krawczyk, T. Krovetz, and P. Rogaway, "UMAC: fast and secure message authen-tication," Proceedings of Crypto'99, LNCS 1666, pp. 216-233, Springer-Verlag, Berlin, 1999.
-
(1999)
Proceedings of Crypto'99
, pp. 216-233
-
-
Black, J.1
Halevi, S.2
Krawczyk, H.3
Krovetz, T.4
Rogaway, P.5
-
2
-
-
0025386404
-
A logic of authentication
-
Feb
-
M. Burrows, M. Abadi, and R. Needham, "A logic of authentication," ACM Transactions on Computer Systems, vol. 18, no. 1, pp. 18-36, Feb. 1990.
-
(1990)
ACM Transactions on Computer Systems
, vol.18
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
3
-
-
0031637758
-
A simple logic for authentication protocol design
-
Rockport, MA, June
-
L. Buttyan, S. Staamann, and U. Wilhelm, "A simple logic for authentication protocol design," 11th IEEE Computer Security Foundations Workshop, pp. 9-11, Rockport, MA, June 1998.
-
(1998)
11th IEEE Computer Security Foundations Workshop
, pp. 9-11
-
-
Buttyan, L.1
Staamann, S.2
Wilhelm, U.3
-
4
-
-
58149197417
-
Bandwidth-conserving multicast VoIP teleconference system
-
T. K. Chua and D. C. Pheanis, "Bandwidth-conserving multicast VoIP teleconference system," International Journal of Network Security, vol. 7, no. 1, pp. 42-48, 2008.
-
(2008)
International Journal of Network Security
, vol.7
, Issue.1
, pp. 42-48
-
-
Chua, T.K.1
Pheanis, D.C.2
-
5
-
-
2342637990
-
The Rijndael block ci-pher: AES proposal
-
Ventura, California, Aug
-
J. Daemen and V. Rijmen, "The Rijndael block ci-pher: AES proposal," First Candidate Conference (AES1), pp. 343-348, Ventura, California, Aug. 1998.
-
(1998)
First Candidate Conference (AES1)
, pp. 343-348
-
-
Daemen, J.1
Rijmen, V.2
-
6
-
-
84889351757
-
How to sign digital streams
-
LNCS 1294 Springer-Verlag Berlin
-
R. Gennar and P. Rohatgi, "How to sign digital streams," Proceedings of the 17th Annual Interna-tional Cryptology Conference on Advances in Cryp-tology, LNCS 1294, pp. 180-197, Springer-Verlag, Berlin, 1997.
-
(1997)
Proceedings of the 17th Annual Interna-tional Cryptology Conference on Advances in Cryp-tology
, pp. 180-197
-
-
Gennar, R.1
Rohatgi, P.2
-
7
-
-
80054073044
-
Scal-able delay-constrained multicast group key manage-ment
-
S. Gharout, Y. Challal, and A. Bouabdallah, "Scal-able delay-constrained multicast group key manage-ment," International Journal of Network Security, vol. 7, no. 2, pp. 160-174, 2008.
-
(2008)
International Journal of Network Security
, vol.7
, Issue.2
, pp. 160-174
-
-
Gharout, S.1
Challal, Y.2
Bouabdallah, A.3
-
8
-
-
85180799647
-
Authenticating streamed data in the presence of random packet loss
-
IEEE Computer Society Press, USA
-
P. Golle and N. Modadugu, "Authenticating streamed data in the presence of random packet loss," Proceedings of the ISOC Network and Dis-tributed System Security Symposium, pp. 13-22, IEEE Computer Society Press, USA, 2001.
-
(2001)
Proceedings of the ISOC Network and Dis-tributed System Security Symposium
, pp. 13-22
-
-
Golle, P.1
Modadugu, N.2
-
9
-
-
24944508408
-
Distillation codes and applications to Dos re-sistant multicast authentication
-
IEEE Computer Society Press, USA
-
C. Karlof, N. Sastry, Y. Li, A. Perrig, and J. Ty-gar, "Distillation codes and applications to Dos re-sistant multicast authentication," Proceedings of the ISOC Network and Distributed System Security Sym-posium, pp. 37-56, IEEE Computer Society Press, USA, 2004.
-
(2004)
Proceedings of the ISOC Network and Distributed System Security Sym-posium
, pp. 37-56
-
-
Karlof, C.1
Sastry, N.2
Li, Y.3
Perrig, A.4
Ty-gar, J.5
-
10
-
-
34250309913
-
Scalable solutions for secure group communications
-
Science Direct, Nov
-
R. Mukherjee and J. Atwood, "Scalable solutions for secure group communications," Computers and Se-curity, pp. 3525-3548, Science Direct, Nov. 2007.
-
(2007)
Computers and Se-curity
, pp. 3525-3548
-
-
Mukherjee, R.1
Atwood, J.2
-
11
-
-
0033690336
-
Effi-cient authentication and signing of multicast streams over lossy channels
-
IEEE Com-puter Society Press, USA, May
-
A. Perrig, R. Canetti, J. Tygar, and D. Song, "Effi-cient authentication and signing of multicast streams over lossy channels," Proceedings of IEEE Sympo-sium on Security and Privacy, pp. 56-73, IEEE Com-puter Society Press, USA, May 2000.
-
(2000)
Proceedings of IEEE Sympo-sium on Security and Privacy
, pp. 56-73
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.3
Song, D.4
-
12
-
-
0034838199
-
ELK, a new protocol for efficient large group key distribution
-
Oakland, California, USA, May
-
A. Perrig, D. Song, and J. Tygar, "ELK, a new protocol for efficient large group key distribution," Proceedings of IEEE Symposium on Security and Privacy, pp. 47-62, Oakland, California, USA, May 2001.
-
(2001)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 47-62
-
-
Perrig, A.1
Song, D.2
Tygar, J.3
-
15
-
-
80054085942
-
SeReRoM: Secured reliable routing scheme for multicasting
-
R. Srinivasan, V. Vaidehi, K. N. Srivathsan, L. Ramesh Babu, and C. Karunagaran, "SeReRoM: Secured reliable routing scheme for multicasting," International Journal of Network Security, vol. 5, no. 1, pp. 82-88, 2007.
-
(2007)
International Journal of Network Security
, vol.5
, Issue.1
, pp. 82-88
-
-
Srinivasan, R.1
Vaidehi, V.2
Srivathsan, K.N.3
Ramesh Babu, L.4
Karunagaran, C.5
-
16
-
-
80054068072
-
Secure group key management scheme for multicast networks
-
R. Srinivasan, V. Vaidehi, R. Rajaraman, S. Kana-garaj, R. Chidambaram Kalimuthu, and R. Dharmaraj, "Secure group key management scheme for multicast networks," International Journal of Network Security, vol. 11, no. 1, pp. 30-34, 2010.
-
(2010)
International Journal of Network Security
, vol.11
, Issue.1
, pp. 30-34
-
-
Srinivasan, R.1
Vaidehi, V.2
Rajaraman, R.3
Kanagaraj, S.4
Chidambaram Kalimuthu, R.5
Dharmaraj, R.6
-
17
-
-
33744934228
-
Cryptography and Network Security
-
Third Edition, Prentice-Hall
-
W. Stallings, Cryptography and Network Security: Principals and Practices, Third Edition, Prentice-Hall, 2003.
-
(2003)
Principals and Practices
-
-
Stallings, W.1
-
18
-
-
40049083567
-
Efficient key agreement for large and dynamic multicast groups
-
L. Wang and C. K. Wu, "Efficient key agreement for large and dynamic multicast groups," International Journal of Network Security, vol. 3, no. 1, pp. 8-17, 2006.
-
(2006)
International Journal of Network Security
, vol.3
, Issue.1
, pp. 8-17
-
-
Wang, L.1
Wu, C.K.2
-
19
-
-
0032594123
-
Digital signatures for flows and multicasts
-
C. Wong and S. Lam, "Digital signatures for flows and multicasts," IEEE/ACM Transactions on Networking, vol. 7, no. 4, pp. 502-513, 1999.
-
(1999)
IEEE/ACM Transactions on Networking
, vol.7
, Issue.4
, pp. 502-513
-
-
Wong, C.1
Lam, S.2
-
20
-
-
80054085558
-
A peer-based recovery scheme for group rekeying in secure multicast
-
Q. Zhang and K. L. Calvert, "A peer-based recovery scheme for group rekeying in secure multicast," International Journal of Network Security, vol. 6, no. 1, pp. 15-25, 2008.
-
(2008)
International Journal of Network Security
, vol.6
, Issue.1
, pp. 15-25
-
-
Zhang, Q.1
Calvert, K.L.2
|