A coding-theoretic approach for efficient message verification over insecure channels
暂无分享,去创建一个
Radha Poovendran | Patrick Tague | David Slater | Brian J. Matt | R. Poovendran | P. Tague | B. Matt | D. Slater
[1] Adrian Perrig,et al. Distillation Codes and Applications to DoS Resistant Multicast Authentication , 2004, NDSS.
[2] Michalis Faloutsos,et al. Denial of service attacks at the MAC layer in wireless ad hoc networks , 2002, MILCOM 2002. Proceedings.
[3] Kai-Bor Yu,et al. Adaptive beamforming for wideband jamming cancellation , 1997, Proceedings of the 1997 IEEE National Radar Conference.
[4] Lan Nguyen,et al. Accumulators from Bilinear Pairings and Applications , 2005, CT-RSA.
[5] Michael Luby,et al. LT codes , 2002, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..
[6] Ralph C. Merkle,et al. Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.
[7] Michael Luby,et al. A digital fountain approach to reliable distribution of bulk data , 1998, SIGCOMM '98.
[8] Philippe Golle,et al. Authenticating Streamed Data in the Presence of Random Packet Loss , 2001, NDSS.
[9] Birgit Pfitzmann,et al. Collision-Free Accumulators and Fail-Stop Signature Schemes Without Trees , 1997, EUROCRYPT.
[10] Wenyuan Xu,et al. Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.
[11] Josh Benaloh,et al. One-Way Accumulators: A Decentralized Alternative to Digital Sinatures (Extended Abstract) , 1994, EUROCRYPT.
[12] Richard A. Poisel,et al. Modern Communications Jamming Principles and Techniques , 2003 .
[13] Rakesh Kumar,et al. Pollution in P2P file sharing systems , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[14] Srdjan Capkun,et al. Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[15] László Czap,et al. Securing coding based distributed storage in wireless sensor networks , 2008, 2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems.
[16] Kazue Sako,et al. Efficient Receipt-Free Voting Based on Homomorphic Encryption , 2000, EUROCRYPT.
[17] Simon S. Lam,et al. Digital signatures for flows and multicasts , 1999, TNET.
[18] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[19] Theodore S. Rappaport,et al. Wireless communications - principles and practice , 1996 .
[20] Ross J. Anderson. Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .
[21] Ron M. Roth,et al. Introduction to Coding Theory , 2019, Discrete Mathematics.
[22] Guevara Noubir,et al. On link layer denial of service in data wireless LANs , 2005, Wirel. Commun. Mob. Comput..
[23] P. Maymounkov. Online codes , 2002 .
[24] Srdjan Capkun,et al. Jamming-resistant Broadcast Communication without Shared Keys , 2009, USENIX Security Symposium.
[25] R. Durrett. Essentials of Stochastic Processes , 1999 .
[26] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.