Efficient Multicast Authentication Batch Signature
暂无分享,去创建一个
[1] Ali Mahlooji Far,et al. Retinal Image Analysis Using Curvelet Transform and Multistructure Elements Morphology by Reconstruction , 2011, IEEE Transactions on Biomedical Engineering.
[2] Asadullah Shah,et al. Measuring Efficiency of Tier Level Data Centers to Implement Green Energy Efficient Data Centers , 2013 .
[3] Ali Abbasi,et al. Comparing the Static and Dynamic Balances and Their Relationship with the Anthropometrical Characteristics in the Athletes of Selected Sports , 2013 .
[4] Sibghatullah Nasir,et al. Microfinance in India: Contemporary Issues and Challenges , 2013 .
[5] David M'Raïhi,et al. Can D.S.A. be Improved? Complexity Trade-Offs with the Digital Signature Standard , 1994, EUROCRYPT.
[6] Chae Hoon Lim,et al. Security of interactive DSA batch verification , 1994 .
[7] Lein Harn,et al. Batch verifying multiple RSA digital signatures , 1998 .
[8] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[9] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[10] Roberto Tamassia,et al. Multicast authentication in fully adversarial networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[11] Simon S. Lam,et al. Digital signatures for flows and multicasts , 1999, TNET.
[12] V. Khanaa,et al. An Integrated Agent System for E-mail Coordination using Jade , 2013 .
[13] Simon S. Lam,et al. Digital signatures for flows and multicasts , 1998, Proceedings Sixth International Conference on Network Protocols (Cat. No.98TB100256).
[14] Ran Canetti,et al. Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[15] Jessica Staddon,et al. Graph-based authentication of digital streams , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[16] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[17] Yuguang Fang,et al. Multicast Authentication over Lossy Channels , 2007, MILCOM 2007 - IEEE Military Communications Conference.
[18] Edwin K. P. Chong,et al. Efficient multicast stream authentication using erasure codes , 2003, TSEC.
[19] Stephen E. Deering,et al. Multicast routing in internetworks and extended LANs , 1988, SIGCOMM '88.
[20] Shi Cui,et al. An efficient identity-based signature scheme with batch verifications , 2006, InfoScale '06.
[21] Dan Boneh,et al. Digital Signature Standard , 2005, Encyclopedia of Cryptography and Security.
[22] Mihir Bellare,et al. Fast Batch Verification for Modular Exponentiation and Digital Signatures , 1998, IACR Cryptol. ePrint Arch..