메뉴 건너뛰기




Volumn 6, Issue 2-3, 2011, Pages 101-111

A source authentication scheme using network coding

Author keywords

Analysis; Authentication; Homomorphic encryption; Impersonation attack; Linear network coding; Simulation; Wireless ad hoc networks

Indexed keywords

AD HOC NETWORKS; AUTHENTICATION; CODES (SYMBOLS); CRYPTOGRAPHY; ECONOMIC AND SOCIAL EFFECTS; LINEAR NETWORKS; NETWORK SECURITY;

EID: 84857173760     PISSN: 17478405     EISSN: 17478413     Source Type: Journal    
DOI: 10.1504/IJSN.2011.043669     Document Type: Article
Times cited : (16)

References (28)
  • 3
    • 3042683432 scopus 로고    scopus 로고
    • Message authentication using hash functions: The HMAC construction. RSA laboratories
    • Spring
    • Bellare, M., Canetti, R., and Krawczyk, H. (1996) 'Message authentication using hash functions: the HMAC construction. RSA Laboratories', CryptoBytes, Vol. 2, No. 1, Spring.
    • (1996) CryptoBytes , vol.2 , Issue.1
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 7
    • 84874800178 scopus 로고
    • A public-key cryptosystem and a signature scheme based on discrete logarithms
    • El Gamal, T. (1985) 'A public-key cryptosystem and a signature scheme based on discrete logarithms', IEEE Transactions on Information Theory, Vol. 31, No. 4, pp.469-472.
    • (1985) IEEE Transactions on Information Theory , vol.31 , Issue.4 , pp. 469-472
    • El Gamal, T.1
  • 8
    • 70349682315 scopus 로고    scopus 로고
    • An efficient privacy-preserving scheme against traffic analysis attacks in network coding
    • 19-25 April
    • Fan, Y., Jiang, Y., Zhu, H. and Shen, X. (2009) 'An efficient privacy-preserving scheme against traffic analysis attacks in network coding', IEEE INFOCOM, 19-25 April, pp.2213-2221.
    • (2009) IEEE INFOCOM , pp. 2213-2221
    • Fan, Y.1    Jiang, Y.2    Zhu, H.3    Shen, X.4
  • 9
    • 79960595492 scopus 로고    scopus 로고
    • SANC: Source authentication using network coding
    • April
    • Fathy, A., ElBatt, T. and Youssef, M. (2011) 'SANC: Source Authentication Using Network Coding', IEEE SCNC Workshop, April, pp.1012-1017.
    • (2011) IEEE SCNC Workshop , pp. 1012-1017
    • Fathy, A.1    ElBatt, T.2    Youssef, M.3
  • 10
    • 33745142955 scopus 로고    scopus 로고
    • Network coding: An instant primer
    • DOI 10.1145/1111322.1111337
    • Fragouli, C., Le Boudec, J.Y. and Widmer, J. (2006) 'Network coding: an instant primer', ACM SIGCOMM Computer Communication Review, January, pp.63-68. (Pubitemid 46323585)
    • (2006) Computer Communication Review , vol.36 , Issue.1 , pp. 63-68
    • Fragouli, C.1    Le Boudec, J.-Y.2    Widmer, J.3
  • 11
    • 51349150827 scopus 로고    scopus 로고
    • Reliability gain of network coding in lossy wireless networks
    • Ghaderi, M., Towsley, D., Kurose, J. (2008) 'Reliability gain of network coding in lossy wireless networks', IEEE INFOCOM'08.
    • (2008) IEEE INFOCOM'08
    • Ghaderi, M.1    Towsley, D.2    Kurose, J.3
  • 12
    • 39049090594 scopus 로고    scopus 로고
    • Cooperative security for network coding file distribution
    • April
    • Gkantsidis, C. and Rodriguez, P. (2006) 'Cooperative security for network coding file distribution', IEEE INFOCOM, April, pp.1-13.
    • (2006) IEEE INFOCOM , pp. 1-13
    • Gkantsidis, C.1    Rodriguez, P.2
  • 14
    • 73449086635 scopus 로고    scopus 로고
    • An efficient dynamic-identity based signature scheme for secure network coding
    • Jiang, Y., Zhu, H., Shi, M., Shen, X. and Lin, C. (2010) 'An efficient dynamic-identity based signature scheme for secure network coding', ElSevier Computer Networks, Vol. 54, No. 1, pp.28-40.
    • (2010) ElSevier Computer Networks , vol.54 , Issue.1 , pp. 28-40
    • Jiang, Y.1    Zhu, H.2    Shi, M.3    Shen, X.4    Lin, C.5
  • 16
    • 0242334165 scopus 로고    scopus 로고
    • An algebraic approach to network coding
    • October
    • Koetter, R. and Medard, M. (2003) 'An algebraic approach to network coding', IEEE/ACM Transactions on Networking, Vol. 11, No. 5, October, pp.782-795.
    • (2003) IEEE/ACM Transactions on Networking , vol.11 , Issue.5 , pp. 782-795
    • Koetter, R.1    Medard, M.2
  • 17
    • 0037323073 scopus 로고    scopus 로고
    • Linear network coding
    • IEEE Transactions on February
    • Li, S-Y.R., Yeung, R.W. and Cai, N. (2003) 'Linear network coding', Information Theory, IEEE Transactions on, Vol.49, No. 2, February, pp.371-381.
    • (2003) Information Theory , vol.49 , Issue.2 , pp. 371-381
    • Li, S.-Y.R.1    Yeung, R.W.2    Cai, N.3
  • 18
    • 25844497569 scopus 로고    scopus 로고
    • On achieving optimal throughput with network coding
    • Proceedings - IEEE INFOCOM 2005. The Conference on Computer Communications - 24th Annual Joint Conference of the IEEE Computer and Communications Societies
    • Li, Z., Li, B., Jiang, D. and Lau, L.C. (2005) 'On achieving optimal throughput with network coding', IEEE INFOCOM'05, March, pp.2184-2194. (Pubitemid 41390727)
    • (2005) Proceedings - IEEE INFOCOM , vol.3 , pp. 2184-2194
    • Li, Z.1    Li, B.2    Jiang, D.3    Lau, L.C.4
  • 21
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Paillier, P. (1999) 'Public-key cryptosystems based on composite degree residuosity classes', EUROCRYPT, pp.223-238.
    • (1999) EUROCRYPT , pp. 223-238
    • Paillier, P.1
  • 26
    • 77951613128 scopus 로고    scopus 로고
    • Tiered authentication of multicast traffic in wireless ad-hoc networks
    • November
    • Younis, M. and Farrag, O. (2009) 'Tiered authentication of multicast traffic in wireless ad-hoc networks', IEEE GLOBECOM'09, November, pp.1-7.
    • (2009) IEEE GLOBECOM'09 , pp. 1-7
    • Younis, M.1    Farrag, O.2
  • 27
    • 69249185292 scopus 로고    scopus 로고
    • An efficient signature-based scheme for securing network coding against pollution attacks
    • April
    • Yu, Z., Wei, Y., Ramkumar, B. and Guan, Y. (2008) 'An efficient signature-based scheme for securing network coding against pollution attacks', IEEE INFOCOM'08, April, pp.1409-1417.
    • (2008) IEEE INFOCOM'08 , pp. 1409-1417
    • Yu, Z.1    Wei, Y.2    Ramkumar, B.3    Guan, Y.4
  • 28
    • 77953319343 scopus 로고    scopus 로고
    • P-coding: Secure network coding against eavesdropping attacks
    • March
    • Zhang, P., Jiang, Y., Lin, C., Fan, Y. and Shen, X. (2010) 'P-coding: secure network coding against eavesdropping attacks', IEEE INFOCOM, March, pp.1-9.
    • (2010) IEEE INFOCOM , pp. 1-9
    • Zhang, P.1    Jiang, Y.2    Lin, C.3    Fan, Y.4    Shen, X.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.