메뉴 건너뛰기




Volumn , Issue , 2012, Pages 1987-1991

Efficient signature scheme for network coding

Author keywords

Digital signatures; File sharing; Group testing; Homomorphic signatures; Network coding; Peer to peer

Indexed keywords

BATCH TECHNIQUES; FILE SHARING; GROUP TESTING; HOMOMORPHIC SIGNATURES; LINEAR COMBINATIONS; NETWORK THROUGHPUT; PEER TO PEER; POLLUTION ATTACK; SIGNATURE SCHEME;

EID: 84867488906     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISIT.2012.6283647     Document Type: Conference Paper
Times cited : (3)

References (19)
  • 1
    • 68849097857 scopus 로고    scopus 로고
    • Homomorphic MACs: MAC-Based Integrity for Network Coding
    • Springer Verlag
    • S. Agrawal and D. Boneh. Homomorphic MACs: MAC-Based Integrity for Network Coding. In ACNS 2009. pages 292-305, Springer Verlag.
    • (2009) ACNS , pp. 292-305
    • Agrawal, S.1    Boneh, D.2
  • 4
    • 79958003537 scopus 로고    scopus 로고
    • Homomorphic Signatures for Polynomial Functions
    • D. Boneh, D. M Freeman. Homomorphic Signatures for Polynomial Functions. In EUROCRYPT 2011. pages 149-168
    • (2011) EUROCRYPT , pp. 149-168
    • Boneh, D.1    Freeman, D.M.2
  • 9
    • 5044242517 scopus 로고    scopus 로고
    • Byzantine Modification Detection in Multicast Networks using Randomized Network Coding
    • T. Ho, B. Leong, R. Koetter, and M. Medard. Byzantine Modification Detection in Multicast Networks using Randomized Network Coding. In IEEE Proc. ISIT 2004.
    • IEEE Proc. ISIT 2004
    • Ho, T.1    Leong, B.2    Koetter, R.3    Medard, M.4
  • 12
    • 70349653419 scopus 로고    scopus 로고
    • Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding
    • E. Kehdi, B. Li, "Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding." in INFOCOM 2009 pages 1224-1232
    • (2009) INFOCOM , pp. 1224-1232
    • Kehdi, E.1    Li, B.2
  • 15
    • 49149086879 scopus 로고    scopus 로고
    • Explicit Non-adaptive Combinatorial Group Testing Schemes
    • E. Porat, A. Rothschild, "Explicit Non-adaptive Combinatorial Group Testing Schemes". In ICALP (1) 2008 pages 748-759
    • (2008) ICALP , Issue.1 , pp. 748-759
    • Porat, E.1    Rothschild, A.2
  • 16
    • 84867531010 scopus 로고    scopus 로고
    • Insecure "Provable Secure Network Coding"
    • Y. Wang, Insecure "Provable Secure Network Coding". In IACR Cryptology ePrint Archive 2009: 504, 2009
    • (2009) IACR Cryptology EPrint Archive , vol.504 , pp. 2009
    • Wang, Y.1
  • 18
    • 51349130622 scopus 로고    scopus 로고
    • An Efficient Signature-based Scheme for Securing Network Coding against Pollution Attacks
    • Z. Yu, T. Wei, B. Ramkumar, and Y. Guan. An Efficient Signature-based Scheme for Securing Network Coding against Pollution Attacks. In IEEE INFOCOM, 2008.
    • (2008) IEEE INFOCOM
    • Yu, Z.1    Wei, T.2    Ramkumar, B.3    Guan, Y.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.