메뉴 건너뛰기




Volumn , Issue , 2003, Pages

Efficient Multicast Packet Authentication

Author keywords

[No Author keywords available]

Indexed keywords

MULTICASTING; NETWORK SECURITY; PACKET NETWORKS;

EID: 85180537111     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (74)

References (34)
  • 1
    • 84948986458 scopus 로고
    • Optimal asymmetric encryption
    • A. D. Santis, editor, pages Berlin, Springer-Verlag. Lecture Notes in Computer Science 950
    • M. Bellare and P. Rogaway. Optimal asymmetric encryption. In A. D. Santis, editor, Advances in Cryptology - EuroCrypt’94, pages 92–111, Berlin, 1995. Springer-Verlag. Lecture Notes in Computer Science Volume 950.
    • (1995) Advances in Cryptology - EuroCrypt’94 , pp. 92-111
    • Bellare, M.1    Rogaway, P.2
  • 3
    • 0032624505 scopus 로고    scopus 로고
    • Adaptive FEC-based error control for internet telephony
    • J.-C. Bolot, S. Fosse-Parisis, and D. F. Towsley. Adaptive FEC-based error control for internet telephony. In INFOCOM (3), pages 1453–1460, 1999.
    • (1999) INFOCOM , Issue.3 , pp. 1453-1460
    • Bolot, J.-C.1    Fosse-Parisis, S.2    Towsley, D. F.3
  • 10
    • 0003521726 scopus 로고    scopus 로고
    • Streamed authentication in the presence of random packet loss
    • to appear in
    • P. Golle and N. Modadugo. Streamed authentication in the presence of random packet loss. In to appear in NDSS 2001., 2001.
    • (2001) NDSS 2001
    • Golle, P.1    Modadugo, N.2
  • 16
    • 0000961370 scopus 로고    scopus 로고
    • Iolus: A framework for scalable secure multicasting
    • (September 14-18, Cannes, France), 1997
    • S. Mittra. Iolus: A framework for scalable secure multicasting. In Proceedings of the ACM SIGCOMM’97 (September 14-18, 1997, Cannes, France), 1997.
    • (1997) Proceedings of the ACM SIGCOMM’97
    • Mittra, S.1
  • 17
    • 0003629991 scopus 로고
    • National Institute of Standards and Technology
    • National Institute of Standards and Technology. Secure hash standard, 1995.
    • (1995) Secure hash standard
  • 20
    • 0032677326 scopus 로고    scopus 로고
    • End-to-end internet packet dynamics
    • V. Paxson. End-to-end internet packet dynamics. IEEE/ACM Transactions on Networking, 7(3):277–292, 1999.
    • (1999) IEEE/ACM Transactions on Networking , vol.7 , Issue.3 , pp. 277-292
    • Paxson, V.1
  • 24
    • 0024641589 scopus 로고
    • Efficient dispersal of information for security, load balancing, and fault tolerance
    • M. O. Rabin. Efficient dispersal of information for security, load balancing, and fault tolerance. Journal of the ACM, 36(2):335–348, 1989.
    • (1989) Journal of the ACM , vol.36 , Issue.2 , pp. 335-348
    • Rabin, M. O.1
  • 26
    • 0031122982 scopus 로고    scopus 로고
    • Effective erasure codes for reliable computer communication protocols
    • L. Rizzo. Effective erasure codes for reliable computer communication protocols. ACMCCR: Computer Communication Review, 27, 1997.
    • (1997) ACMCCR: Computer Communication Review , vol.27
    • Rizzo, L.1
  • 27
    • 0033280006 scopus 로고    scopus 로고
    • A compact and fast hybrid signature scheme for multicast packet authentication
    • Singapore, November Association for Computing Machinery
    • P. Rohatgi. A compact and fast hybrid signature scheme for multicast packet authentication. In Proceedings of the 6th ACM conference on Computer and Communications Security, pages 93–100, Singapore, November 1999. Association for Computing Machinery.
    • (1999) Proceedings of the 6th ACM conference on Computer and Communications Security , pp. 93-100
    • Rohatgi, P.1
  • 29
    • 77949434635 scopus 로고    scopus 로고
    • Expander graphs for digital stream authentication and robust overlay networks
    • Berkeley, California, May
    • D. Song, J. D. Tygar, and D. Zuckerman. Expander graphs for digital stream authentication and robust overlay networks. In 2002 IEEE Symposium on Security and Privacy, Berkeley, California, May 2002.
    • (2002) 2002 IEEE Symposium on Security and Privacy
    • Song, D.1    Tygar, J. D.2    Zuckerman, D.3
  • 30
    • 0032178082 scopus 로고    scopus 로고
    • Secure group communications using key graphs
    • C. K. Wong, M. Gouda, and S. S. Lam. Secure group communications using key graphs. In ACM SIGCOMM 1998, pages 68–79, 1998.
    • (1998) ACM SIGCOMM 1998 , pp. 68-79
    • Wong, C. K.1    Gouda, M.2    Lam, S. S.3
  • 31
  • 34
    • 0032677669 scopus 로고    scopus 로고
    • Measurement and modeling of the temporal dependence in packet loss
    • New York, Mar
    • M. Yajnik, S. Moon, J. Kurose, and D. Towsley. Measurement and modeling of the temporal dependence in packet loss. In IEEE INFOCOM, New York, Mar. 1999.
    • (1999) IEEE INFOCOM
    • Yajnik, M.1    Moon, S.2    Kurose, J.3    Towsley, D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.