IEEE INFOCOM 2008 - The 27th Conference on Computer Communications 2008
DOI: 10.1109/infocom.2008.199
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Signature-Based Scheme for Securing Network Coding Against Pollution Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
78
0

Year Published

2008
2008
2020
2020

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 178 publications
(78 citation statements)
references
References 13 publications
0
78
0
Order By: Relevance
“…Zhang et al [7] discussed a batch signature verification scheme for the communications between vehicles and infrastructure to lower the total verification time. Horng et al [8] presented a group signature and batch verification method for secure in the system. On the other hand, batch identification is to find the bad signatures within a batch, when the batch verification fails.…”
Section: IImentioning
confidence: 99%
See 2 more Smart Citations
“…Zhang et al [7] discussed a batch signature verification scheme for the communications between vehicles and infrastructure to lower the total verification time. Horng et al [8] presented a group signature and batch verification method for secure in the system. On the other hand, batch identification is to find the bad signatures within a batch, when the batch verification fails.…”
Section: IImentioning
confidence: 99%
“…Stanek [7] showed that method was flawed, and proposed an improved protocol to ©IJRASET (UGC Approved Journal): All Rights are Reserved resist attacks. Matt [8] discussed a solution in pairing-based signature scheme, which can identify nontrivial numbers of invalid signatures in batches. The generic batch identification methods utilize the group testing technique to find invalid signatures with the minimal number of tests, which can be applied with any signature types.…”
Section: IImentioning
confidence: 99%
See 1 more Smart Citation
“…For the homomorphic digital signatures [26], [27], [28], [29], [30] the source (or intermediate nodes) can construct a valid signature on the encoded block using the signatures of the raw data without accessing the private key. The verification of the signature is possible for the collector in the usual way, assuming a PKI is available.…”
Section: Related Workmentioning
confidence: 99%
“…Several solutions were proposed to combat this attack [9,52,47]. However, packet pollution is only one of many potential attacks.…”
Section: Introductionmentioning
confidence: 99%