A source authentication scheme based on message recovery digital signature for multicast
暂无分享,去创建一个
[1] Xiaohua Jia,et al. QoS multicast routing in cognitive radio ad hoc networks , 2012, Int. J. Commun. Syst..
[2] Habib Youssef,et al. MLCC: A new hash-chained mechanism for multicast source authentication , 2009 .
[3] Yacine Challal,et al. H2A: Hybrid Hash-chaining scheme for Adaptive multicast source authentication of media-streaming , 2005, Comput. Secur..
[4] Rainer A. Rueppel,et al. A new signature scheme based on the DSA giving message recovery , 1993, CCS '93.
[5] J. William Atwood,et al. Scalable solutions for secure group communications , 2007, Comput. Networks.
[6] Wade Trappe,et al. Reducing delay and enhancing DoS resistance in multicast authentication through multigrade security , 2006, IEEE Transactions on Information Forensics and Security.
[7] Ran Canetti,et al. Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[8] Rosario Gennaro,et al. How to Sign Digital Streams , 1997, CRYPTO.
[9] Mostafa Ammar,et al. Security issues and solutions in multicast content distribution: a survey , 2003 .
[10] Chin-Chen Chang,et al. A Novel Digital Signature Scheme for Application of Document Review in a Linearly Hierarchical Organization , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[11] Zhou Zhi-guo,et al. Notice of Violation of IEEE Publication Principles Design and Implementation of Wireless Computational Grid based on JavaSpace , 2007 .
[12] Ran Canetti,et al. Efficient and Secure Source Authentication for Multicast , 2001, NDSS.
[13] Yan Li. Application of Multi-Agent for Collaborative Product Design Engineering , 2007 .
[14] Antonio Lioy,et al. The ForwardDiffSig Scheme for Multicast Authentication , 2010, IEEE/ACM Transactions on Networking.
[15] George Xylomenos,et al. Support of multiple content variants in the multimedia broadcast/multicast service , 2011, Int. J. Commun. Syst..
[16] Iuon-Chang Lin,et al. An Efficient Source Authentication for Multicast Based on Merkle Hash Tree , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[17] Xin Liu,et al. Efficient and Secure Source Authentication with Packet Passports , 2006, SRUTI.
[18] Yacine Challal,et al. A taxonomy of multicast data origin authentication: Issues and solutions , 2004, IEEE Communications Surveys & Tutorials.
[19] Yacine Challal,et al. Hybrid and Adaptive Hash-Chaining Scheme for Data-Streaming Source Authentication , 2004, HSNMC.
[20] Hsiao-Hwa Chen,et al. A reliable overlay video transport protocol for multicast agents in wireless mesh networks , 2012, Int. J. Commun. Syst..
[21] Dawn Song,et al. The TESLA Broadcast Authentication Protocol , 2002 .