Sciweavers

318 search results - page 18 / 64
» A New Family of Authentication Protocols
Sort
View
101
Voted
IWDC
2001
Springer
129views Communications» more  IWDC 2001»
15 years 4 months ago
Towards a New Generation of Generic Transport Protocols
Considering that current end to end communication services are not adapted for supporting efficiently distributed multimedia application, this paper introduces a new family of gene...
Patrick Sénac, Ernesto Exposito, Michel Dia...
116
Voted
CEAS
2008
Springer
15 years 2 months ago
Improving Email Trustworthiness through Social-Group Key Authentication
The increasing use of email for phishing and unsolicited marketing has reduced the trustworthiness of email as a communication medium. Sender authentication is a known defense aga...
Vivek Pathak, Liviu Iftode, Danfeng Yao
LCN
2006
IEEE
15 years 6 months ago
The Internet Group Management Protocol with Access Control (IGMP-AC)
IP Multicast is best known for its bandwidth conservation and lower resource utilization. The classical model of multicast makes it difficult to permit access only to authorized ...
Salekul Islam, J. William Atwood
108
Voted
IJISEC
2008
92views more  IJISEC 2008»
15 years 14 days ago
A coding approach to the multicast stream authentication problem
We study the multicast stream authentication problem when an opponent can drop, reorder and introduce data packets into the communication channel. In such a model, packet overhead...
Christophe Tartary, Huaxiong Wang, Josef Pieprzyk
SP
2010
IEEE
156views Security Privacy» more  SP 2010»
14 years 10 months ago
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes
Abstract--We consider resource-constrained broadcast authentication for n receivers in a static, known network topology. There are only two known broadcast authentication protocols...
Haowen Chan, Adrian Perrig