2006
DOI: 10.1007/11604938_9
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Multicast Stream Authentication for the Fully Adversarial Network Model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2006
2006
2011
2011

Publication Types

Select...
4
3

Relationship

3
4

Authors

Journals

citations
Cited by 10 publications
(16 citation statements)
references
References 17 publications
0
16
0
Order By: Relevance
“…Indeed, in [62], Very Smooth Hash [12] was used to reduce the time needed to exhaust the list of size U (n) output by MPR.…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…Indeed, in [62], Very Smooth Hash [12] was used to reduce the time needed to exhaust the list of size U (n) output by MPR.…”
Section: Resultsmentioning
confidence: 99%
“…Finally, we will recall an algorithm by Guruswami and Sudan achieving polynomial reconstruction. As in [35,63], it will be used to deal with packet injections.…”
Section: Preliminariesmentioning
confidence: 99%
See 2 more Smart Citations
“…In an earlier version of this work (Tartary and Wang, 2005), we proposed to decrease the time spent for signature generation and verification by creating a single signature per family of λ blocks where each of them consists of n packets. Now we suggest to use a Trapdoor Hash Function (THF) instead of a digital signature to ensure non-repudiation of data.…”
Section: Introductionmentioning
confidence: 99%