-
1
-
-
79959817037
-
Practical defenses against pollution attacks in wireless network coding
-
June
-
J. Dong, R. Curtmola, and C. Nita-Rotaru, "Practical defenses against pollution attacks in wireless network coding, " ACM Trans. Inf. Syst. Secur., vol. 14, pp. 7:1-7:31, June 2011.
-
(2011)
ACM Trans. Inf. Syst. Secur.
, vol.14
, pp. 71-731
-
-
Dong, J.1
Curtmola, R.2
Nita-Rotaru, C.3
-
2
-
-
79960873240
-
Padding for orthogonality: Efficient subspace authentication for network coding
-
april
-
P. Zhang, Y. Jiang, C. Lin, H. Yao, A. Wasef, and X. Shen, "Padding for orthogonality: Efficient subspace authentication for network coding, " in INFOCOM, 2011 Proceedings IEEE, april 2011, pp. 1026 -1034.
-
(2011)
INFOCOM, 2011 Proceedings IEEE
, pp. 1026-1034
-
-
Zhang, P.1
Jiang, Y.2
Lin, C.3
Yao, H.4
Wasef, A.5
Shen, X.6
-
4
-
-
84878908921
-
Cooperative defense against pollution attacks in network coding using spacemac
-
abs/1102. 3504
-
A. Le and A. Markopoulou, "Cooperative defense against pollution attacks in network coding using spacemac, " CoRR, vol. abs/1102. 3504, 2011.
-
(2011)
CoRR
-
-
Le, A.1
Markopoulou, A.2
-
5
-
-
77953307858
-
Mis: Malicious nodes identification scheme in network-coding-based peer-to-peer streaming
-
Q. Wang, L. Vu, K. Nahrstedt, and H. Khurana, "Mis: Malicious nodes identification scheme in network-coding-based peer-to-peer streaming, " in INFOCOM, 2010 Proceedings IEEE, 2010, pp. 1-5.
-
(2010)
INFOCOM, 2010 Proceedings IEEE
, pp. 1-5
-
-
Wang, Q.1
Vu, L.2
Nahrstedt, K.3
Khurana, H.4
-
6
-
-
67049095592
-
Signing a linear subspace: Signature schemes for network coding
-
Springer-Verlag
-
D. Boneh, D. Freeman, J. Katz, and B. Waters, "Signing a linear subspace: Signature schemes for network coding, " in Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09. Springer-Verlag, 2009, pp. 68-87.
-
(2009)
Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
, pp. 68-87
-
-
Boneh, D.1
Freeman, D.2
Katz, J.3
Waters, B.4
-
7
-
-
77953301246
-
Ripple authentication for network coding
-
march
-
Y. Li, H. Yao, M. Chen, S. Jaggi, and A. Rosen, "Ripple authentication for network coding, " in INFOCOM, 2010 Proceedings IEEE, march 2010, pp. 1 -9.
-
(2010)
INFOCOM, 2010 Proceedings IEEE
, pp. 1-9
-
-
Li, Y.1
Yao, H.2
Chen, M.3
Jaggi, S.4
Rosen, A.5
-
8
-
-
68849097857
-
Homomorphic macs: Mac-based integrity for network coding
-
Springer Berlin / Heidelberg
-
S. Agrawal and D. Boneh, "Homomorphic macs: Mac-based integrity for network coding, " in Applied Cryptography and Network Security, ser. Lecture Notes in Computer Science. Springer Berlin / Heidelberg, 2009, vol. 5536, pp. 292-305.
-
(2009)
Applied Cryptography and Network Security, Ser. Lecture Notes in Computer Science
, vol.5536
, pp. 292-305
-
-
Agrawal, S.1
Boneh, D.2
-
9
-
-
0032661699
-
Multicast security: A taxonomy and some efficient constructions
-
mar, vol. 2
-
R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas, "Multicast security: a taxonomy and some efficient constructions, " in INFOCOM '99. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, vol. 2, mar 1999, pp. 708 -716 vol. 2.
-
(1999)
INFOCOM '99. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE
, vol.2
, pp. 708-716
-
-
Canetti, R.1
Garay, J.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
10
-
-
84976664565
-
A method for obtaining digital signatures and public-key cryptosystems
-
January
-
R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems, " Commun. ACM, vol. 26, pp. 96-99, January 1983.
-
(1983)
Commun. ACM
, vol.26
, pp. 96-99
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
11
-
-
0242426103
-
The tesla broadcast authentication protocol
-
A. Perrig, R. Canetti, J. D. Tygar, and D. Song, "The tesla broadcast authentication protocol, " RSA CryptoBytes, pp. 2-13, 2002.
-
(2002)
RSA CryptoBytes
, pp. 2-13
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.D.3
Song, D.4
-
12
-
-
15744368857
-
Efficient and secure source authentication for multicast
-
A. Perrig, R. Canetti, D. Song, and J. D. Tygar, "Efficient and secure source authentication for multicast, " in In Network and Distributed System Security Symposium, NDSS '01, 2001, pp. 35-46.
-
(2001)
Network and Distributed System Security Symposium, NDSS '01
, pp. 35-46
-
-
Perrig, A.1
Canetti, R.2
Song, D.3
Tygar, J.D.4
-
14
-
-
35048891868
-
Keying hash functions for message authentication
-
London, UK: Springer-Verlag
-
M. Bellare, R. Canetti, and H. Krawczyk, "Keying hash functions for message authentication, " in Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology, ser. CRYPTO '96. London, UK: Springer-Verlag, 1996, pp. 1-15.
-
(1996)
Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology, Ser. CRYPTO '96
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
|