Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications
DOI: 10.1109/iscc.2002.1021720
|View full text |Cite
|
Sign up to set email alerts
|

Authenticating real time packet streams and multicasts

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
24
0

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(24 citation statements)
references
References 13 publications
0
24
0
Order By: Relevance
“…In their recent work, Pannetrat and Molva [2002] propose a stream authentication scheme that is similar to our approach (initially published in Park et al [2002]). They propose to authenticate real-time data streams by piggybacking the current block's encoded authentication information (via an erasure code) onto the next block.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In their recent work, Pannetrat and Molva [2002] propose a stream authentication scheme that is similar to our approach (initially published in Park et al [2002]). They propose to authenticate real-time data streams by piggybacking the current block's encoded authentication information (via an erasure code) onto the next block.…”
Section: Related Workmentioning
confidence: 99%
“…By strategy, our scheme trades off sender and receiver delay for an improvement in verification rate. Note that the technique of Pannetrat et al [2002] can be applied to SAIDA to remove the sender delay at the cost of increased receiver delay and vice versa.…”
Section: Overhead Comparisonmentioning
confidence: 99%
“…This signature will then propagate throughout the hash-chain to assure non-repudiation of the chained packets. A second approach [49,50] [27,28] [29,30] consists in signing only a small piece of authentication information (namely hashes of block packets). The resulting authentication information (the signature as well as the original authentication information) is processed and dispersed among the block packets to be signed.…”
Section: Introductionmentioning
confidence: 99%
“…In the same paper, various techniques are proposed to face with this problem, based upon cryptographic fingerprinting techniques, that allow the receiver to immediately distinguish among original and maliciously introduced packets. An alternative technique for facing with DoS attacks is introduced by Pannetrat et al [15], who propose sending FEC encoded authentication data relative to a packet group along with the previous packet group.…”
Section: ( 9 4 @ 5 Amentioning
confidence: 99%