Dynamic Security Scheme for Multicast Source Authentication
暂无分享,去创建一个
[1] Toshinobu Kaneko,et al. A LINEAR ATTACK ON THE RANDOM GENERATOR BY A NONLINEAR COMBINER , 1999 .
[2] D. T. Lee,et al. Attack Probability Based Deterministic Key Predistribution Mechanism for Non-Uniform Sensor Deployment , 2007, 27th International Conference on Distributed Computing Systems Workshops (ICDCSW'07).
[3] Zhou Zhi-guo,et al. Notice of Violation of IEEE Publication Principles Design and Implementation of Wireless Computational Grid based on JavaSpace , 2007 .
[4] Ran Canetti,et al. Multicast Security (MSEC) Group Key Management Architecture , 2005, RFC.
[5] Burton S. Kaliski,et al. The MD2 Message-Digest Algorithm , 1992, RFC.
[6] Mark Handley,et al. The Use of Forward Error Correction (FEC) in Reliable Multicast , 2002, RFC.
[7] Alex Koifman,et al. RAMP: a reliable adaptive multicast protocol , 1996, Proceedings of IEEE INFOCOM '96. Conference on Computer Communications.
[8] Philippe Golle,et al. Authenticating Streamed Data in the Presence of Random Packet Loss , 2001, NDSS.
[9] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[10] R.S. Yadav,et al. Bandwidth Delay Quality Parameter Based Multicast Congestion Control , 2008, 2008 16th International Conference on Advanced Computing and Communications.
[11] Christophe Diot,et al. Deployment issues for the IP multicast service and architecture , 2000, IEEE Netw..
[12] Babak Sadeghiyan,et al. Methods of attack on hash functions , 1993 .
[13] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[14] Michael O. Rabin,et al. Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.
[15] Ronald L. Rivest,et al. The MD4 Message-Digest Algorithm , 1990, RFC.
[16] Jessica Staddon,et al. Graph-based authentication of digital streams , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[17] Yacine Challal,et al. A/sup 2/cast: an adaptive source authentication protocol for multicast streams , 2004, Proceedings. ISCC 2004. Ninth International Symposium on Computers And Communications (IEEE Cat. No.04TH8769).
[18] Simon S. Lam,et al. Digital signatures for flows and multicasts , 1999, TNET.
[19] Robert Braudes,et al. Requirements for Multicast Protocols , 1993, RFC.
[20] Ulrich Schmidt,et al. Security and potential level preferences with thresholds , 2007 .
[21] Gonzalo Camarillo,et al. Security Attacks Found Against the Stream Control Transmission Protocol (SCTP) and Current Countermeasures , 2007, RFC.
[22] Sushil Jajodia,et al. Efficient security mechanisms for overlay multicast based content delivery , 2007, Comput. Commun..
[23] Ran Canetti,et al. Efficient and Secure Source Authentication for Multicast , 2001, NDSS.
[24] Donald F. Towsley,et al. Measurement and modelling of the temporal dependence in packet loss , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[25] Arnaud Legout,et al. Bandwidth-allocation policies for unicast and multicast flows , 2001, IEEE/ACM Trans. Netw..
[26] Ran Canetti,et al. Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[27] Sunyoung Han,et al. User-Oriented Batch Processing of Individual Rekeying , 2008, 2008 International Conference on Information Science and Security (ICISS 2008).
[28] Eli Biham,et al. TIGER: A Fast New Hash Function , 1996, FSE.
[29] Brian Weis,et al. The Multicast Group Security Architecture , 2004, RFC.
[30] Rosario Gennaro,et al. How to Sign Digital Streams , 1997, Inf. Comput..