-
1
-
-
35048864396
-
Authenticating multicast streams in lossy channels using threshold techniques
-
ICN 2001, July
-
Al-Ibrahim, M. and Pieprzyk, J. (2001) ‘Authenticating multicast streams in lossy channels using threshold techniques’, ICN 2001, July, Lecture Notes in Computer Science, Vol. 2094, pp.239–249.
-
(2001)
Lecture Notes in Computer Science
, vol.2094
, pp. 239-249
-
-
Al-Ibrahim, M.1
Pieprzyk, J.2
-
2
-
-
15744375170
-
A taxonomy of multicast data origin authentication: issues and solutions
-
Challal, Y., Bettahar, H. and Bouabdallah, A. (2004) ‘A taxonomy of mu▒lticast data origin authentication: issues and solutions’, IEEE Communications Surveys and Tutorials, Vol. 6, No. 3, pp.34–57.
-
(2004)
IEEE Communications Surveys and Tutorials
, vol.6
, Issue.3
, pp. 34-57
-
-
Challal, Y.1
Bettahar, H.2
Bouabdallah, A.3
-
3
-
-
33746095782
-
VSH: an efficient and provable collision resistant hash function
-
Contini, S., Lenstra, A.K. and Steinfeld, R. (2006) ‘VSH: an efficient and provable collision resistant hash function’, Advances in Cryptology – Eurocrypt’06, May, Lecture Notes in Computer Science, Vol. 4004, pp.165–182.
-
(2006)
Advances in Cryptology – Eurocrypt’06, May, Lecture Notes in Computer Science
, vol.4004
, pp. 165-182
-
-
Contini, S.1
Lenstra, A.K.2
Steinfeld, R.3
-
5
-
-
33744979306
-
-
July
-
Dai, W. (2004) ‘Crypto++ 5.2.1 benchmarks’, July, Available at: http://www.eskimo.com/~weidai/benchmarks.html.
-
(2004)
Crypto++ 5.2.1 benchmarks
-
-
Dai, W.1
-
6
-
-
85028913061
-
On-line/off-line digital signatures
-
Even, S., Goldreich, O. and Micali, S. (1989) ‘On-line/off-line digital signatures’, Advances in Cryptology – Crypto’89, August, Lecture Notes in Computer Science, Vol. 435, pp.263–277.
-
(1989)
Advances in Cryptology – Crypto’89, August, Lecture Notes in Computer Science
, vol.435
, pp. 263-277
-
-
Even, S.1
Goldreich, O.2
Micali, S.3
-
8
-
-
33744814634
-
How to authenticate real time streams using improved online/offline signatures
-
Gao, C. and Yao, Z. (2005) ‘How to authenticate real time streams using improved online/offline signatures’, Fourth International Conference on Cryptology and Network Security, December, Lecture Notes In Computer Science, Vol. 3810, pp.134—146.
-
(2005)
Fourth International Conference on Cryptology and Network Security, December, Lecture Notes In Computer Science
, vol.3810
, pp. 134-146
-
-
Gao, C.1
Yao, Z.2
-
9
-
-
84889351757
-
How to sign digital streams
-
Gennaro, R. and Rohatgi, P. (1997) ‘How to sign digital streams’, Advances in Cryptology – Crypto’97, August, Lecture Notes in Computer Science, Vol. 1294, pp.180–197.
-
(1997)
Advances in Cryptology – Crypto’97, August, Lecture Notes in Computer Science
, vol.1294
, pp. 180-197
-
-
Gennaro, R.1
Rohatgi, P.2
-
10
-
-
85180799647
-
Authenticating streamed data in the presence of random packet loss
-
Golle, P. and Modadugu, N. (2001) ‘Authenticating streamed data in the presence of random packet loss’, NDSS 2001, February, Internet Society, pp.13–22.
-
(2001)
NDSS 2001, February, Internet Society
, pp. 13-22
-
-
Golle, P.1
Modadugu, N.2
-
11
-
-
0033183669
-
Improved decoding of Reed-Solomon and algebraic-geometric codes
-
Guruswami, V. and Sudan, M. (1999) ‘Improved decoding of Reed-Solomon and algebraic-geometric codes’, IEEE Transactions on Information Theory, Vol. 45, No. 6, pp.1757–1767.
-
(1999)
IEEE Transactions on Information Theory
, vol.45
, Issue.6
, pp. 1757-1767
-
-
Guruswami, V.1
Sudan, M.2
-
13
-
-
24944508408
-
Distillation codes and applications to DoS resistant multicast authentication
-
February
-
Karlof, C., Sastry, N., Li, Y., Perrig, A. and Tygar, J.D. (2004) ‘Distillation codes and applications to DoS resistant multicast authentication’, Eleventh Network and Distributed Systems Security Symposium (NDSS), February.
-
(2004)
Eleventh Network and Distributed Systems Security Symposium (NDSS)
-
-
Karlof, C.1
Sastry, N.2
Li, Y.3
Perrig, A.4
Tygar, J.D.5
-
17
-
-
84969346266
-
A certified digital signature
-
Merkle, R. (1989) ‘A certified digital signature’, Advances in Cryptology – Crypto’89, August, Lecture Notes in Computer Science, Vol. 435, pp.218–238.
-
(1989)
Advances in Cryptology – Crypto’89, August, Lecture Notes in Computer Science
, vol.435
, pp. 218-238
-
-
Merkle, R.1
-
20
-
-
1542625909
-
Efficient multicast stream authentication using erasure codes
-
Park, J.M., Chong, E.K.P. and Siegel, H.J. (2003) ‘Efficient multicast stream authentication using erasure codes’, ACM – TISSEC, Vol. 6, No. 2, pp.258–285.
-
(2003)
ACM – TISSEC
, vol.6
, Issue.2
, pp. 258-285
-
-
Park, J.M.1
Chong, E.K.P.2
Siegel, H.J.3
-
21
-
-
0036079874
-
Efficient multicast packet authentication using signature amortization
-
Park, J.M., Chong, E.K.P. and Siegel, H.J. (2002) ‘Efficient multicast packet authentication using signature amortization’, IEEE Symposium on Security and Privacy, May, pp.227–240.
-
(2002)
IEEE Symposium on Security and Privacy
, vol.May
, pp. 227-240
-
-
Park, J.M.1
Chong, E.K.P.2
Siegel, H.J.3
-
22
-
-
47649129735
-
The eSAIDA stream authentication scheme
-
Park, Y. and Cho, Y. (2004) ‘The eSAIDA stream authentication scheme’, ICCSA, April, pp.799–807.
-
(2004)
ICCSA
, vol.April
, pp. 799-807
-
-
Park, Y.1
Cho, Y.2
-
23
-
-
0032677326
-
End-to-end Internet packet dynamics
-
June
-
Paxson, V. (1999) ‘End-to-end Internet packet dynamics’, IEEE/ACM Transactions on Networking, June, pp.277–292.
-
(1999)
IEEE/ACM Transactions on Networking
, pp. 277-292
-
-
Paxson, V.1
-
24
-
-
0033690336
-
Efficient authentication and signing of multicast streams over lossy channels
-
Perrig, A., Canetti, R., Tygar, J.D. and Song, D. (2000) ‘Efficient authentication and signing of multicast streams over lossy channels’, IEEE Symposium on Security and Privacy, May, pp.56–73.
-
(2000)
IEEE Symposium on Security and Privacy
, vol.May
, pp. 56-73
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.D.3
Song, D.4
-
27
-
-
0024641589
-
Efficient dispersal of information for security, load balancing and fault tolerance
-
April
-
Rabin, M.O. (1989) ‘Efficient dispersal of information for security, load balancing and fault tolerance’, Journal of the Association for Computing machinery, April, Vol. 36, No. 2, pp.335–348.
-
(1989)
Journal of the Association for Computing machinery
, vol.36
, Issue.2
, pp. 335-348
-
-
Rabin, M.O.1
-
28
-
-
0033280006
-
A compact and fast hybrid signature scheme for multicast packet authentication
-
Rohatgi, P. (1999) ‘A compact and fast hybrid signature scheme for multicast packet authentication’, CCS’99, pp.93–100.
-
(1999)
CCS’99
, pp. 93-100
-
-
Rohatgi, P.1
-
29
-
-
84880883264
-
Improved online/offline signature schemes
-
August, Lecture Notes in Computer Science
-
Shamir, A. and Tauman, Y. (2001) ‘Improved online/offline signature schemes’, Advances in Cryptology – Crypto’01, August, Lecture Notes in Computer Science, Vol. 2139, pp.355–367.
-
(2001)
Advances in Cryptology – Crypto’01
, vol.2139
, pp. 355-367
-
-
Shamir, A.1
Tauman, Y.2
-
31
-
-
33744941348
-
Efficient multicast stream authentication for the fully adversarial network
-
Tartary, C. and Wang, H. (2005) ‘Efficient multicast stream authentication for the fully adversarial network’, sixth International Workshop on Information Security Applications, August, Lecture Notes in Computer Science, Vol. 3786, pp.108–125.
-
(2005)
sixth International Workshop on Information Security Applications, August, Lecture Notes in Computer Science
, vol.3786
, pp. 108-125
-
-
Tartary, C.1
Wang, H.2
-
32
-
-
33745171465
-
Finding collisions in the full SHA-1
-
Wang, X., Yin, Y.L. and Yu, H. (2005) ‘Finding collisions in the full SHA-1’, Advances in Cryptology – Crypto’05, August, Lecture Notes in Computer Science, Vol. 3621, pp.17–36.
-
(2005)
Advances in Cryptology – Crypto’05, August, Lecture Notes in Computer Science
, vol.3621
, pp. 17-36
-
-
Wang, X.1
Yin, Y.L.2
Yu, H.3
-
33
-
-
24944591357
-
How to break MD5 and other hash functions
-
Efficient multicast stream authentication for the fully adversarial network model
-
Wang, X. and Yu, H. (2005) ‘How to break MD5 and other hash functions’, Advances in Cryptology – Eurocrypt’05, May, Lecture Notes in Computer Science, Vol. 3494, pp.19–35.Efficient multicast stream authentication for the fully adversarial network model
-
(2005)
Advances in Cryptology – Eurocrypt’05, May, Lecture Notes in Computer Science
, vol.3494
, pp. 19-35
-
-
Wang, X.1
Yu, H.2
-
34
-
-
0032594123
-
Digital signatures for flows and multicasts
-
August
-
Wong, C.K. and Lam, S.S. (1999) ‘Digital signatures for flows and multicasts’, IEEE/ACM Transactions on Networking, August, Vol. 7, No. 4.
-
(1999)
IEEE/ACM Transactions on Networking
, vol.7
, Issue.4
-
-
Wong, C.K.1
Lam, S.S.2
-
35
-
-
0032677669
-
Measurement and modelling of the temporal dependence in packet loss
-
IEEE Press
-
Yajnik, M., Moon, S., Kurose, J. and Towsley, D. (1999) ‘Measurement and modelling of the temporal dependence in packet loss’, IEEE Infocom, IEEE Press, pp.345–352.
-
(1999)
IEEE Infocom
, pp. 345-352
-
-
Yajnik, M.1
Moon, S.2
Kurose, J.3
Towsley, D.4
-
36
-
-
85043077167
-
-
Since the data stream is large it is divided into fixed-size entities called packets
-
Since the data stream is large it is divided into fixed-size entities called packets.
-
-
-
-
37
-
-
85043068820
-
-
We call authentication tag the extra information appended to a packet to provide its authenticity
-
We call authentication tag the extra information appended to a packet to provide its authenticity.
-
-
-
|