1 |
/
[
Chris Karlof
] /
|
2 |
TESLA:Multicast Source Authentication Transform Introduction
/
[
Perrig;Canetti;Song;Tygar;Briscoe
] /
IETF MSEC WG draft-ietf-msec-tesla-intro-00.txt
|
3 |
Security issues and solutions in multicast content distribution:a survey
/
[
Judge,P.;Ammar,M.
] /
IEEE Network
|
4 |
Efficient Authentication and Signing of Multicast Streams over Lossy Channels
/
[
Adrian Perring;Ran Canetti;J.D.Tygar;Dawn Song
] /
Proc. of IEEE Security and Privancy Symposium S&P 2000
|
5 |
Digital Signatures for Flows and Multicasts
/
[
C.Wong;S.Lam
] /
IEEE/ACM Trans. Net.
|
6 |
Multicast Securit y:A Taxonomy and Efficient Constructions
/
[
R.Canetti(et al.)
] /
IEEE INFOCOM
|
7 |
Authenticating Multicast Streams in Lossy Channels Using Threshold Techniques
/
[
Mohamed Al-Ibrahim;Josef Pieprzyk
] /
ICN 2001, LNCS 2094
|
8 |
Efficient multicast stream authentication using erasure codes
/
[
Jung Min Park;Edwin,K.P.Chong;Howard Jay Siegel
] /
ACM Transactions on Information and System Security
DOI
|
9 |
How to Sign Digital Streams
/
[
R.Gennaro;P.Rohatgi
] /
LNCS
|