Handbook of theoretical computer science (vol. A)
Incremental Cryptography: The Case of Hashing and Signing
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Short Signatures from the Weil Pairing
Journal of Cryptology
Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series)
Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series)
Building scalable and robust peer-to-peer overlay networks for broadcasting using network coding
Proceedings of the twenty-fourth annual ACM symposium on Principles of distributed computing
Constructing elliptic curves with prescribed embedding degrees
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory
Homomorphic MACs: MAC-Based Integrity for Network Coding
ACNS '09 Proceedings of the 7th International Conference on Applied Cryptography and Network Security
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
Linearly homomorphic signatures over binary fields and new tools for lattice-based signatures
PKC'11 Proceedings of the 14th international conference on Practice and theory in public key cryptography conference on Public key cryptography
Revocation for delegatable anonymous credentials
PKC'11 Proceedings of the 14th international conference on Practice and theory in public key cryptography conference on Public key cryptography
Homomorphic signatures for polynomial functions
EUROCRYPT'11 Proceedings of the 30th Annual international conference on Theory and applications of cryptographic techniques: advances in cryptology
Secure network coding over the integers
PKC'10 Proceedings of the 13th international conference on Practice and Theory in Public Key Cryptography
Computing on authenticated data
TCC'12 Proceedings of the 9th international conference on Theory of Cryptography
Energy efficient authentication strategies for network coding
Concurrency and Computation: Practice & Experience
Improved security for linearly homomorphic signatures: a generic framework
PKC'12 Proceedings of the 15th international conference on Practice and Theory in Public Key Cryptography
Computing on authenticated data for adjustable predicates
ACNS'13 Proceedings of the 11th international conference on Applied Cryptography and Network Security
How network coding system constrains packet pollution attacks in wireless sensor networks
International Journal of Grid and Utility Computing
Hi-index | 0.00 |
This paper presents a practical digital signature scheme to be used in conjunction with network coding. Furthermore, the authors' idea simultaneously provides authentication and detects malicious nodes that intentionally corrupt content on the network.