DaTA -- Data-Transparent Authentication Without Communication Overhead
暂无分享,去创建一个
Sushil Jajodia | Songqing Chen | Shiping Chen | Xinyuan Wang | S. Jajodia | Songqing Chen | Shiping Chen | Xinyuan Wang
[1] Sushil Jajodia,et al. Tracking anonymous peer-to-peer VoIP calls on the internet , 2005, CCS '05.
[2] Alain Pannetrat,et al. Real time multicast authentication , 2003 .
[3] David Moore,et al. Characteristics of fragmented IP traffic on internet links , 2001, IMW '01.
[4] H. Hawkins,et al. The National Hurricane Center , 1961 .
[5] Pankaj Rohatgi,et al. A compact and fast hybrid signature scheme for multicast packet authentication , 1999, CCS '99.
[6] Yin Zhang,et al. The Stationarity of Internet Path Properties: Routing, Loss, and Throughput , 2000 .
[7] Hugo Krawczyk,et al. A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..
[8] Shai Ben-David,et al. Detecting Change in Data Streams , 2004, VLDB.
[9] Simon S. Lam,et al. Digital signatures for flows and multicasts , 1998, Proceedings Sixth International Conference on Network Protocols (Cat. No.98TB100256).
[10] Alec Wolman,et al. Measurement and Analysis of a Streaming Media Workload , 2001, USITS.
[11] Carla E. Brodley,et al. IP covert timing channels: design and detection , 2004, CCS '04.
[12] Philippe Golle,et al. Authenticating Streamed Data in the Presence of Random Packet Loss , 2001, NDSS.
[13] Robert M. White,et al. National Oceanic and Atmospheric Administration , 2020, Federal Regulatory Guide.
[14] Jessica Staddon,et al. Graph-based authentication of digital streams , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[15] Chun-Shien Lu,et al. Multipurpose audio watermarking , 2000, Proceedings 15th International Conference on Pattern Recognition. ICPR-2000.
[16] Jiri Fridrich,et al. Images with self-correcting capabilities , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).
[17] Heng Yin,et al. Building an Application-Aware IPsec Policy System , 2005, IEEE/ACM Transactions on Networking.
[18] Matt Blaze,et al. The Architecture and Implementation of Network Layer Security in UNIX , 1993, USENIX Security Symposium.
[19] Al Morton,et al. Standardized active measurements on a tier 1 IP backbone , 2003, IEEE Commun. Mag..
[20] Shih-Fu Chang,et al. A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..
[21] Rosario Gennaro,et al. How to Sign Digital Streams , 1997, CRYPTO.
[22] Adrian Perrig,et al. Distillation Codes and Applications to DoS Resistant Multicast Authentication , 2004, NDSS.
[23] Lawrence O'Gorman,et al. Electronic marking and identification techniques to discourage document copying , 1994, Proceedings of INFOCOM '94 Conference on Computer Communications.
[24] Edwin K. P. Chong,et al. Efficient multicast packet authentication using signature amortization , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[25] Bernd Girod,et al. Watermarking of MPEG-2 encoded video without decoding and reencoding , 1997, Electronic Imaging.
[26] Zheng Liu,et al. Multimedia authentication with sensor-based watermarking , 2004, MM&Sec '04.
[27] Ran Canetti,et al. Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[28] Randall J. Atkinson,et al. Security Architecture for the Internet Protocol , 1995, RFC.
[29] Minghua Chen,et al. A fragile watermark error detection scheme for wireless video communications , 2005, IEEE Transactions on Multimedia.