Authentication Mechanism for Efficient Multicast Service
![]() |
Jung Yumi
(이화여자대학교 과학기술대학원 컴퓨터학과)
Par Jung-Min (이화여자대학교 과학기술대학원 컴퓨터학과) Chae Kijoon (이화여자대학교 컴퓨터학과) Lee Sang-Ho (이화여자대학교 컴퓨터학과) Nah Jaehoon (한국전자통신연구원) |
1 | M. Borella, D. Swider, S. Uludag and G. Brewster, 'Internet Packet Loss: Measurement and Implications for End-to-End QoS,' In Proc. of the International Conference on Parallel Processing, pp.3-15, 1998 DOI |
2 | V. Paxson, 'End-to-End Internet Packet Dynamics,' IEEE/ACM Trans. on Networking, Vol.12, No.5, pp.277-292, 1999 DOI ScienceOn |
3 | 'The Network Simulator : ns-2,' http://www.isi.edu/nsnam/ns/ |
4 | 'Crypto++,' http://www.eskimo.com./~weidai/cryptlib.html |
5 | R. L. Rivest, 'The MD5 Message Digest Algorithm,' RFC 1321, 1992 |
6 | W. Stalling, Network Security Essentials: Application and Standards, Prentice Hall, 2001 |
7 | A. Perrig, 'The BiBa One-Time Signature and Broadcast Authentication Protocol,' ACM Conference on Computer and Communications Security, pp.28-37, 2001 |
8 | P. Rohatgi, 'A Compact and Fast Hybrid Signature Scheme for Multicast Packet Authentication,' Proc. of ACM Conference on Computer and Communications Security, Nov., 1999 DOI |
9 | R. Merkel, 'A Certified Digital Signature,' Advanced in Cryptology(CRYPTO '89), pp.218-238, Aug., 1989 |
10 | A. Perrig, R. Canetti, J. D. Tygar and D. Song, 'Efficient Authentication and Signing of Multicast Streams over Lossy Channels,' Proc. of IEEE Symposium on Security and Privacy, pp.56-73, May, 2000 |
11 | C. K. Wong and S. S. Lam, 'Digital Signatures for Flows and Multicasts,' IEEE Trans. on Networking, Vol.7, No.4, pp.502-513, Aug., 1999 DOI ScienceOn |
12 | R. L. Rivest, A. Shamir and L. Adleman, 'A Method for Obtaining Digital Signatures and Public Key Cryptosystems,' Communications of the ACM, Vol.21, No.2, pp.120-126, 1978 DOI ScienceOn |
13 | A. Perrig, R. Canetti, D. Song, D. Tygar and B. Briscoe, 'TESLA : Multicast Source Authentication Transform Introduction,' Internet draft, IETF, 2002 |
14 | A. Perrig, R. Canetti and B. Whillock, 'TESLA: Multicast Source Authentication Transform Specification,' Internet draft, IETF, 2002 |
15 | C. Diot, B. N. Levine, B. Lyles, H. Kassem, D. Balensiefen, 'Deployment Issues for the IP Multicast Service and Architecture,' IEEE Network, Vol.14, pp.88-98, Jan., 2000 DOI ScienceOn |
16 | R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor and B. Pinkas, 'Multicast Security: A Taxonomy and Some Efficient Constructions,' INFOCOM'99, Vol.2, pp.708-716, Mar., 1999 DOI |
17 | A. Perrig, R. Canetti, D. Song and J. D. Tygar, 'Efficient and Secure Source Authentication for Multicast,' Proceedings of Network and Distributed System Security Symposium(NDSS) 2001, Feb., 2001 |
18 | B. Quinn, K. Almeroth, 'IP Multicast Application: Challenges and Solutions,' RFC3170, Sep., 2001 |
![]() |