REPRESENTATION OF MULTIPLE MESSAGE AUTHENTICATION CODES USING BLOOM FILTERS
暂无分享,去创建一个
[1] Michael Mitzenmacher,et al. Compressed bloom filters , 2001, PODC '01.
[2] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[3] Poj Tangamchit,et al. A Comparison Study of Static and Dynamic Walking Model of A Biped Robot , 2006 .
[4] Haiyun Luo,et al. Authenticated flooding in large-scale sensor networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..
[5] Moni Naor,et al. Multicast security: a taxonomy and some efficient constructions , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[6] Haiyun Luo,et al. Statistical en-route filtering of injected false data in sensor networks , 2005, IEEE J. Sel. Areas Commun..
[7] Sushil Jajodia,et al. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[8] Kanda Runapongsa,et al. XBrevity: XML Data Compression using Brevity Encoding , 2006 .
[9] Ian H. Witten,et al. Arithmetic coding revisited , 1998, TOIS.