-
1
-
-
84948986458
-
Optimal asymmetric encryption
-
A. D. Santis, editor, pages Berlin, Springer-Verlag. Lecture Notes in Computer Science 950
-
M. Bellare and P. Rogaway. Optimal asymmetric encryption. In A. D. Santis, editor, Advances in Cryptology - EuroCrypt’94, pages 92–111, Berlin, 1995. Springer-Verlag. Lecture Notes in Computer Science Volume 950.
-
(1995)
Advances in Cryptology - EuroCrypt’94
, pp. 92-111
-
-
Bellare, M.1
Rogaway, P.2
-
3
-
-
0032624505
-
Adaptive FEC-based error control for internet telephony
-
J.-C. Bolot, S. Fosse-Parisis, and D. F. Towsley. Adaptive FEC-based error control for internet telephony. In INFOCOM (3), pages 1453–1460, 1999.
-
(1999)
INFOCOM
, Issue.3
, pp. 1453-1460
-
-
Bolot, J.-C.1
Fosse-Parisis, S.2
Towsley, D. F.3
-
7
-
-
0032661699
-
Multicast security: A taxonomy and some efficient constructions
-
R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas. Multicast security: A taxonomy and some efficient constructions. In Proceedings of IEEE Infocom’99, 1999.
-
(1999)
Proceedings of IEEE Infocom’99
-
-
Canetti, R.1
Garay, J.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
9
-
-
84889351757
-
How to sign digital streams
-
B. S. K. Jr., editor, pages Santa Barbara, California, USA, August Springer Verlag
-
R. Gennaro and P. Rohatgi. How to sign digital streams. In B. S. K. Jr., editor, Advances in Cryptology - Proceedings of CRYPTO 97, volume 1294 of Lecture Notes in Computer Science, pages 180–197, Santa Barbara, California, USA, August 1997. Springer Verlag.
-
(1997)
Advances in Cryptology - Proceedings of CRYPTO 97, volume 1294 of Lecture Notes in Computer Science
, pp. 180-197
-
-
Gennaro, R.1
Rohatgi, P.2
-
10
-
-
0003521726
-
Streamed authentication in the presence of random packet loss
-
to appear in
-
P. Golle and N. Modadugo. Streamed authentication in the presence of random packet loss. In to appear in NDSS 2001., 2001.
-
(2001)
NDSS 2001
-
-
Golle, P.1
Modadugo, N.2
-
14
-
-
0030671783
-
Practical loss-resilient codes
-
M. Luby, M. Mitzenmacher, M. A. Shokrollahi, D. A. Spielman, and V. Stemann. Practical loss-resilient codes. In ACM Symposium on Theory of Computing, pages 150–159, 1997.
-
(1997)
ACM Symposium on Theory of Computing
, pp. 150-159
-
-
Luby, M.1
Mitzenmacher, M.2
Shokrollahi, M. A.3
Spielman, D. A.4
Stemann, V.5
-
16
-
-
0000961370
-
Iolus: A framework for scalable secure multicasting
-
(September 14-18, Cannes, France), 1997
-
S. Mittra. Iolus: A framework for scalable secure multicasting. In Proceedings of the ACM SIGCOMM’97 (September 14-18, 1997, Cannes, France), 1997.
-
(1997)
Proceedings of the ACM SIGCOMM’97
-
-
Mittra, S.1
-
17
-
-
0003629991
-
-
National Institute of Standards and Technology
-
National Institute of Standards and Technology. Secure hash standard, 1995.
-
(1995)
Secure hash standard
-
-
-
18
-
-
0032141928
-
Parity-based loss recovery for reliable multicast transmission
-
J. Nonnenmacher, E. W. Biersack, and D. Towsley. Parity-based loss recovery for reliable multicast transmission. IEEE/ACM Transactions on Networking, 6(4):349–361, 1998.
-
(1998)
IEEE/ACM Transactions on Networking
, vol.6
, Issue.4
, pp. 349-361
-
-
Nonnenmacher, J.1
Biersack, E. W.2
Towsley, D.3
-
19
-
-
84862867186
-
Efficient multicast packet authentication using signature amortization
-
Berkeley, California, May
-
J. M. Park, E. K. P. Chong, and H. J. Siegel. Efficient multicast packet authentication using signature amortization. In 2002 IEEE Symposium on Security and Privacy, Berkeley, California, May 2002.
-
(2002)
2002 IEEE Symposium on Security and Privacy
-
-
Park, J. M.1
Chong, E. K. P.2
Siegel, H. J.3
-
20
-
-
0032677326
-
End-to-end internet packet dynamics
-
V. Paxson. End-to-end internet packet dynamics. IEEE/ACM Transactions on Networking, 7(3):277–292, 1999.
-
(1999)
IEEE/ACM Transactions on Networking
, vol.7
, Issue.3
, pp. 277-292
-
-
Paxson, V.1
-
24
-
-
0024641589
-
Efficient dispersal of information for security, load balancing, and fault tolerance
-
M. O. Rabin. Efficient dispersal of information for security, load balancing, and fault tolerance. Journal of the ACM, 36(2):335–348, 1989.
-
(1989)
Journal of the ACM
, vol.36
, Issue.2
, pp. 335-348
-
-
Rabin, M. O.1
-
26
-
-
0031122982
-
Effective erasure codes for reliable computer communication protocols
-
L. Rizzo. Effective erasure codes for reliable computer communication protocols. ACMCCR: Computer Communication Review, 27, 1997.
-
(1997)
ACMCCR: Computer Communication Review
, vol.27
-
-
Rizzo, L.1
-
27
-
-
0033280006
-
A compact and fast hybrid signature scheme for multicast packet authentication
-
Singapore, November Association for Computing Machinery
-
P. Rohatgi. A compact and fast hybrid signature scheme for multicast packet authentication. In Proceedings of the 6th ACM conference on Computer and Communications Security, pages 93–100, Singapore, November 1999. Association for Computing Machinery.
-
(1999)
Proceedings of the 6th ACM conference on Computer and Communications Security
, pp. 93-100
-
-
Rohatgi, P.1
-
29
-
-
77949434635
-
Expander graphs for digital stream authentication and robust overlay networks
-
Berkeley, California, May
-
D. Song, J. D. Tygar, and D. Zuckerman. Expander graphs for digital stream authentication and robust overlay networks. In 2002 IEEE Symposium on Security and Privacy, Berkeley, California, May 2002.
-
(2002)
2002 IEEE Symposium on Security and Privacy
-
-
Song, D.1
Tygar, J. D.2
Zuckerman, D.3
-
30
-
-
0032178082
-
Secure group communications using key graphs
-
C. K. Wong, M. Gouda, and S. S. Lam. Secure group communications using key graphs. In ACM SIGCOMM 1998, pages 68–79, 1998.
-
(1998)
ACM SIGCOMM 1998
, pp. 68-79
-
-
Wong, C. K.1
Gouda, M.2
Lam, S. S.3
-
34
-
-
0032677669
-
Measurement and modeling of the temporal dependence in packet loss
-
New York, Mar
-
M. Yajnik, S. Moon, J. Kurose, and D. Towsley. Measurement and modeling of the temporal dependence in packet loss. In IEEE INFOCOM, New York, Mar. 1999.
-
(1999)
IEEE INFOCOM
-
-
Yajnik, M.1
Moon, S.2
Kurose, J.3
Towsley, D.4
|