Chained Stream Authentication
暂无分享,去创建一个
[1] Stuart E. Schechter,et al. Anonymous Authentication of Membership in Dynamic Groups , 1999, Financial Cryptography.
[2] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[3] Burton S. Kaliski. Advances in Cryptology - CRYPTO '97 , 1997 .
[4] Leslie Lamport,et al. Password authentication with insecure communication , 1981, CACM.
[5] Bruno Crispo,et al. Individual single source authentication on the MBONE , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).
[6] Silvio Micali,et al. How to construct random functions , 1986, JACM.
[7] Ran Canetti,et al. Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[8] S. Cheung,et al. An efficient message authentication scheme for link state routing , 1997, Proceedings 13th Annual Computer Security Applications Conference.
[9] S. Micali. Enhanced Certificate Revocation System , 1995 .
[10] Ralph C. Merkle,et al. A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.
[11] Adi Shamir,et al. PayWord and MicroMint: Two Simple Micropayment Schemes , 1996, Security Protocols Workshop.
[12] Silvio Micali,et al. On-Line/Off-Line Digital Schemes , 1989, CRYPTO.
[13] Christopher Metz. Reliable Multicast: When Many Must Absolutely Positively Receive It , 1998, IEEE Internet Comput..
[14] Rosario Gennaro,et al. How to Sign Digital Streams , 1997, CRYPTO.
[15] Tony Ballardie,et al. Scalable Multicast Key Distribution , 1996, RFC.
[16] Ueli Maurer,et al. On the Efficiency of One-Time Digital Signatures , 1996, ASIACRYPT.
[17] Hugo Krawczyk,et al. Pseudorandom functions revisited: the cascade construction and its concrete security , 1996, Proceedings of 37th Conference on Foundations of Computer Science.
[18] Kwangjo Kim,et al. Advances in Cryptology — ASIACRYPT '96 , 1996, Lecture Notes in Computer Science.
[19] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[20] Carl Pomerance,et al. Advances in Cryptology — CRYPTO ’87 , 2000, Lecture Notes in Computer Science.
[21] Gene Tsudik,et al. Server-Supported Signatures , 1996, ESORICS.
[22] Charalampos Manifavas,et al. A new family of authentication protocols , 1998, OPSR.
[23] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[24] Suvo Mittra,et al. Iolus: a framework for scalable secure multicasting , 1997, SIGCOMM '97.