메뉴 건너뛰기




Volumn 7127 LNCS, Issue , 2012, Pages 1-16

BloomCasting: Security in bloom filter based multicast

Author keywords

[No Author keywords available]

Indexed keywords

ATTACK VECTOR; BIT PERMUTATION; BLOOM FILTERS; DATA PLANES; FALSE POSITIVE; GROUP MANAGEMENT; MULTICAST PACKET; MULTICASTS; PACKET HEADER; SECURITY ISSUES; SPECIFIC STATE;

EID: 84861585597     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-27937-9_1     Document Type: Conference Paper
Times cited : (7)

References (32)
  • 4
    • 0005966913 scopus 로고    scopus 로고
    • Stateless Connections
    • Han, Y., Quing, S. (eds.) ICICS 1997. Springer, Heidelberg
    • Aura, T., Nikander, P.: Stateless Connections. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 87-97. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1334 , pp. 87-97
    • Aura, T.1    Nikander, P.2
  • 5
    • 84947242344 scopus 로고    scopus 로고
    • Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems
    • Moskowitz, I.S. (ed.) IH 2001. Springer, Heidelberg
    • Back, A., Möller, U., Stiglic, A.: Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 245-257. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2137 , pp. 245-257
    • Back, A.1    Möller, U.2    Stiglic, A.3
  • 10
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • Bloom, B.H.: Space/time trade-offs in hash coding with allowable errors. Commun. ACM 13(7), 422-426 (1970)
    • (1970) Commun. ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.H.1
  • 18
    • 0037250819 scopus 로고    scopus 로고
    • Security issues and solutions in multicast content distribution: A survey
    • Judge, P., Ammar, M.: Security issues and solutions in multicast content distribution: A survey. IEEE Network 17, 30-36 (2003)
    • (2003) IEEE Network , vol.17 , pp. 30-36
    • Judge, P.1    Ammar, M.2
  • 19
    • 0017416837 scopus 로고
    • Hierarchical routing for large networks Performance evaluation and optimization
    • Kleinrock, L., Kamoun, F.: Hierarchical routing for large networks Performance evaluation and optimization. Computer Networks 1(3), 155 (1976/1977)
    • (1976) Computer Networks , vol.1 , Issue.3 , pp. 155
    • Kleinrock, L.1    Kamoun, F.2
  • 20
    • 84991939136 scopus 로고
    • LFSR-Based Hashing and Authentication
    • Desmedt, Y.G. (ed.) CRYPTO 1994. Springer, Heidelberg
    • Krawczyk, H.: LFSR-Based Hashing and Authentication. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 129-139. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.839 , pp. 129-139
    • Krawczyk, H.1
  • 22
    • 0033356116 scopus 로고    scopus 로고
    • A survey of security issues in multicast communications
    • Moyer, M., Rao, J., Rohatgi, P.: A survey of security issues in multicast communications. IEEE Network 13(6), 12-23 (1999)
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 12-23
    • Moyer, M.1    Rao, J.2    Rohatgi, P.3
  • 24
    • 0345565893 scopus 로고    scopus 로고
    • A survey of key management for secure group communication
    • Rafaeli, S., Hutchison, D.: A survey of key management for secure group communication. ACM Computing Surveys (CSUR) 35(3), 329 (2003)
    • (2003) ACM Computing Surveys (CSUR) , vol.35 , Issue.3 , pp. 329
    • Rafaeli, S.1    Hutchison, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.