1 |
Chung Kei Wong and Simon S. Lam, Digital Signatures for Flows and Multicasts, IEEE/ACM Transactions on Networking, 7(4):502-513, 1999
DOI
ScienceOn
|
2 |
Peyton Z. Peebles, Jr., Probability, Random Variables and Random Signal Principles, McGraw-Hill International Edition, 2001
|
3 |
Sara Miner, Jessica Staddon, Graph-based Authentication of Digital Streams, In IEEE Symposium on Security and Privacy'01, 2001
DOI
|
4 |
Rosario Gennaro and Pankaj Rohatgi, How to Sign Digital Streams, In CRYPTO'97, pages 180-197, 1997
|
5 |
Ralph C. Merkle, A Certified Digital Signature, In CRYPTO'89, pages 218-238, 1989
|
6 |
Michael O. Rabin, Efficient Dispersal of Information for Security, Load Balancing and Fault Tolerance, Journal of the Association for Computing Machinery, 36(2):335-348, 1989
DOI
ScienceOn
|
7 |
Philippe Golle and Nagendra Modadugu, Authenticating Streamed Data in the Presence of Random Packet Loss, In NDSS'01, pages 13-22, 2001
|
8 |
Adrian Perrig, Ran Canetti, Dawn Song, and J. D. Tygar, Efficient Authentication and Signing of Multicast Streams over Lossy Channels, In Proceedings of IEEE Security and Privacy Symposium, May, 2000
DOI
|
9 |
Jung Min Park, Edwin K. P. Chong, and Howard Jay Siegel, Efficient Multicast Packet Authentication using Signature Amortization, In IEEE Symposium on Security and Privacy'02, 2002
DOI
|
10 |
Yongsu Park, Taesun Chung, and Yookun Cho, An Efficient Stream Authentication Scheme using Tree Chaining, Information Processing Letters, 86(1):1-8, 2003
DOI
ScienceOn
|