Hybrid and Adaptive Hash-Chaining Scheme for Data-Streaming Source Authentication
暂无分享,去创建一个
[1] Moni Naor,et al. Multicast security: a taxonomy and some efficient constructions , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[2] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[3] Dawn Song,et al. The TESLA Broadcast Authentication Protocol , 2002 .
[4] Stephen E. Deering,et al. Multicast routing in internetworks and extended LANs , 1988, SIGCOMM '88.
[5] Rosario Gennaro,et al. How to Sign Digital Streams , 1997, CRYPTO.
[6] Jon Crowcroft,et al. Multicast-specific security threats and counter-measures , 1995, Proceedings of the Symposium on Network and Distributed System Security.
[7] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[8] Burton S. Kaliski,et al. The MD2 Message-Digest Algorithm , 1992, RFC.
[9] Adrian Perrig,et al. TESLA Broadcast Authentication , 2003 .
[10] Ran Canetti,et al. Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[11] Adrian Perrig,et al. The BiBa one-time signature and broadcast authentication protocol , 2001, CCS '01.
[12] Michael S. Borella,et al. Internet packet loss: measurement and implications for end-to-end QoS , 1998, Proceedings of the 1998 ICPP Workshop on Architectural and OS Support for Multimedia Applications Flexible Communication Systems. Wireless Networks and Mobile Computing (Cat. No.98EX206).
[13] Mostafa Ammar,et al. Security issues and solutions in multicast content distribution: a survey , 2003 .
[14] Edwin K. P. Chong,et al. Efficient multicast packet authentication using signature amortization , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[15] Vern Paxson,et al. End-to-end Internet packet dynamics , 1997, SIGCOMM '97.
[16] A. Bouabdallah,et al. A Scalable and Adaptive Key Management Approach for Group Communication , 2003 .
[17] Henning Schulzrinne,et al. RTP: A Transport Protocol for Real-Time Applications , 1996, RFC.
[18] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[19] Philippe Golle,et al. Authenticating Streamed Data in the Presence of Random Packet Loss , 2001, NDSS.
[20] Gene Tsudik,et al. IP multicast security: Issues and directions , 2000, Ann. des Télécommunications.
[21] Donald E. Eastlake,et al. US Secure Hash Algorithm 1 (SHA1) , 2001, RFC.
[22] Simon S. Lam,et al. Digital signatures for flows and multicasts , 1999, TNET.
[23] Bruno Crispo,et al. Individual single source authentication on the MBONE , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).
[24] Donald F. Towsley,et al. Measurement and modelling of the temporal dependence in packet loss , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[25] 田端 利宏,et al. Network and Distributed System Security Symposiumにおける研究動向の調査 , 2004 .
[26] Ran Canetti,et al. A taxonomy of multicast security issues (temporary version) , 1998 .
[27] Yacine Challal,et al. AKMP: an adaptive key management protocol for secure multicast , 2002, Proceedings. Eleventh International Conference on Computer Communications and Networks.
[28] Jessica Staddon,et al. Graph-based authentication of digital streams , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.