Sciweavers

12 search results - page 1 / 3
» Digital Signatures for Flows and Multicasts
Sort
View
ICNP
1998
IEEE
13 years 9 months ago
Digital Signatures for Flows and Multicasts
We present chaining techniques for signing/verifying multiple packets using a single signing/verification operation. We then present flow signing and verification procedures based...
Chung Kei Wong, Simon S. Lam
FTDCS
2003
IEEE
13 years 10 months ago
Adopting Redundancy Techniques for Multicast Stream Authentication
Various schemes have been proposed to achieve strong authenticationof streamed data in a lossy network by means of “light” digital signatures. Such techniques perform a strong...
Tommaso Cucinotta, Gabriele Cecchetti, Gianluca Fe...
EUROCRYPT
2001
Springer
13 years 9 months ago
Lower Bounds for Multicast Message Authentication
Message integrity from one sender to one receiver is typically achieved by having the two parties share a secret key to compute a Message Authentication Code (MAC). We consider the...
Dan Boneh, Glenn Durfee, Matthew K. Franklin
CCS
2006
ACM
13 years 8 months ago
Lightweight, pollution-attack resistant multicast authentication scheme
Authentication is an important security measure for multicast applications, providing receivers with confidence that the packets they receive are valid. Simply signing every multi...
Ya-Jeng Lin, Shiuhpyng Shieh, Warren W. Lin
INFOCOM
1999
IEEE
13 years 9 months ago
Multicast Security: A Taxonomy and Some Efficient Constructions
Multicast communication is becoming the basis for a growing number of applications. It is therefore critical to provide sound security mechanisms for multicast communication. Yet, ...
Ran Canetti, Juan A. Garay, Gene Itkis, Daniele Mi...