Verifying data integrity in peer-to-peer media streaming
暂无分享,去创建一个
[1] Edwin K. P. Chong,et al. Efficient multicast packet authentication using signature amortization , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[2] Leonid Reyzin,et al. Better than BiBa: Short One-Time Signatures with Fast Signing and Verifying , 2002, ACISP.
[3] Matthew K. Franklin,et al. Lower Bounds for Multicast Message Authentication , 2001, EUROCRYPT.
[4] John C.-I. Chuang,et al. Incentive mechanism for peer-to-peer media streaming , 2004, Twelfth IEEE International Workshop on Quality of Service, 2004. IWQOS 2004..
[5] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[6] Eytan Adar,et al. Free Riding on Gnutella , 2000, First Monday.
[7] Michael Luby,et al. A digital fountain approach to reliable distribution of bulk data , 1998, SIGCOMM '98.
[8] Philippe Golle,et al. Authenticating Streamed Data in the Presence of Random Packet Loss , 2001, NDSS.
[9] Adrian Perrig,et al. The BiBa one-time signature and broadcast authentication protocol , 2001, CCS '01.
[10] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[11] Bharat K. Bhargava,et al. PROMISE: peer-to-peer media streaming using CollectCast , 2003, MULTIMEDIA '03.
[12] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[13] Ran Canetti,et al. Efficient and Secure Source Authentication for Multicast , 2001, NDSS.
[14] Peter Druschel,et al. Pastry: Scalable, distributed object location and routing for large-scale peer-to- , 2001 .
[15] Benny Pinkas,et al. Escrow services and incentives in peer-to-peer networks , 2001, EC '01.
[16] Ran Canetti,et al. Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[17] David Mazières,et al. On-the-fly verification of rateless erasure codes for efficient content distribution , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[18] Antony I. T. Rowstron,et al. Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.
[19] M. Bellare,et al. HMAC: Keyed-Hashing for Message Authentication, RFC 2104 , 2000 .
[20] Rosario Gennaro,et al. How to Sign Digital Streams , 1997, Inf. Comput..
[21] Miguel Castro,et al. Secure routing for structured peer-to-peer overlay networks , 2002, OSDI '02.
[22] Pankaj Rohatgi,et al. A compact and fast hybrid signature scheme for multicast packet authentication , 1999, CCS '99.
[23] Simon S. Lam,et al. Digital signatures for flows and multicasts , 1998, Proceedings Sixth International Conference on Network Protocols (Cat. No.98TB100256).