Sciweavers

109 search results - page 1 / 22
» A coding approach to the multicast stream authentication pro...
Sort
View
IJISEC
2008
92views more  IJISEC 2008»
13 years 5 months ago
A coding approach to the multicast stream authentication problem
We study the multicast stream authentication problem when an opponent can drop, reorder and introduce data packets into the communication channel. In such a model, packet overhead...
Christophe Tartary, Huaxiong Wang, Josef Pieprzyk
CANS
2006
Springer
114views Cryptology» more  CANS 2006»
13 years 9 months ago
Achieving Multicast Stream Authentication Using MDS Codes
We address the multicast stream authentication problem when the communication channel is under the control of an opponent who can drop, reorder or inject data. In such a network m...
Christophe Tartary, Huaxiong Wang
ACISP
2007
Springer
13 years 9 months ago
Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication
We study the multicast stream authentication problem when the communication channel is under control of an opponent who can drop, reorder and inject data packets. In this work, we...
Christophe Tartary, Huaxiong Wang
INFOCOM
1999
IEEE
13 years 9 months ago
Multicast Security: A Taxonomy and Some Efficient Constructions
Multicast communication is becoming the basis for a growing number of applications. It is therefore critical to provide sound security mechanisms for multicast communication. Yet, ...
Ran Canetti, Juan A. Garay, Gene Itkis, Daniele Mi...
CCS
2006
ACM
13 years 9 months ago
Lightweight, pollution-attack resistant multicast authentication scheme
Authentication is an important security measure for multicast applications, providing receivers with confidence that the packets they receive are valid. Simply signing every multi...
Ya-Jeng Lin, Shiuhpyng Shieh, Warren W. Lin