A new family of authentication protocols
ACM SIGOPS Operating Systems Review
Digital signatures for flows and multicasts
IEEE/ACM Transactions on Networking (TON)
A compact and fast hybrid signature scheme for multicast packet authentication
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
The BiBa one-time signature and broadcast authentication protocol
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Fast and secure distributed read-only file system
ACM Transactions on Computer Systems (TOCS)
Authenticated multicast immune to denial-of-service attack
Proceedings of the 2002 ACM symposium on Applied computing
SPINS: security protocols for sensor networks
Wireless Networks
Content-Fragile Watermarking Based on Content-Based Digital Signatures
IDMS '99 Proceedings of the 6th International Workshop on Interactive Distributed Multimedia Systems and Telecommunication Services
SAC '00 Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Lower Bounds for Multicast Message Authentication
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Efficient Object-Based Stream Authentication
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
Authenticating Multicast Streams in Lossy Channels Using Threshold Techniques
ICN '01 Proceedings of the First International Conference on Networking-Part 2
A Secrecy Scheme for MPEG Video Data Using the Joint of Compression and Encryption
ISW '99 Proceedings of the Second International Workshop on Information Security
Efficient multicast stream authentication using erasure codes
ACM Transactions on Information and System Security (TISSEC)
Efficient non-repudiation multicast source authentication schemes
Journal of Computer Science and Technology
A graph-theoretical analysis of multicast authentication
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
On the security of wireless network access with enhancements
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Securing the deluge Network programming system
Proceedings of the 5th international conference on Information processing in sensor networks
Lightweight, pollution-attack resistant multicast authentication scheme
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
One-time proxy signatures revisited
Computer Standards & Interfaces
Enforcing provisioning and authorization policy in the Antigone system
Journal of Computer Security
Fast and secure distributed read-only file system
OSDI'00 Proceedings of the 4th conference on Symposium on Operating System Design & Implementation - Volume 4
Scalable solutions for secure group communications
Computer Networks: The International Journal of Computer and Telecommunications Networking
Mitigating DoS attacks against broadcast authentication in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
SecureStream: An intrusion-tolerant protocol for live-streaming dissemination
Computer Communications
Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents
International Journal of Security and Networks
Efficient multicast stream authentication for the fully adversarial network model
International Journal of Security and Networks
Slander-resistant forwarding isolation in ad hoc networks
International Journal of Mobile Network Design and Innovation
Enhancing Security by Embedding Biometric Data in IP Header
SOFSEM '07 Proceedings of the 33rd conference on Current Trends in Theory and Practice of Computer Science
BAP: Broadcast Authentication Using Cryptographic Puzzles
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Proceedings of the second ACM conference on Wireless network security
An Efficient Reversible Image Authentication Method
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Collusion-Resistant Message Authentication in Overlay Multicast Communication
Transactions on Computational Science IV
Secure peer-to-peer 3D streaming
Multimedia Tools and Applications
Pushing the limits of one-time signatures
Proceedings of the 2nd international conference on Security of information and networks
Generalized butterfly graph and its application to video stream authentication
IEEE Transactions on Circuits and Systems for Video Technology
RLH: receiver driven layered hash-chaining for multicast data origin authentication
Computer Communications
Improved server assisted signatures
Computer Networks: The International Journal of Computer and Telecommunications Networking
Authentication schemes for multimedia streams: Quantitative analysis and comparison
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
A Selectable k-Times Relaxed Anonymous Authentication Scheme
Information Security Applications
Authenticated error-correcting codes with applications to multicast authentication
ACM Transactions on Information and System Security (TISSEC)
ICME'09 Proceedings of the 2009 IEEE international conference on Multimedia and Expo
Loss-tolerant real-time content integrity validation for P2P video streaming
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
Performance study of online batch-based digital signature schemes
Journal of Network and Computer Applications
Some notes on the security of the timed efficient stream loss-tolerant authentication scheme
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
Robust authentication of multimedia stream over multicast network
HSI'03 Proceedings of the 2nd international conference on Human.society@internet
Combining prediction hashing and MDS codes for efficient multicast stream authentication
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
A hybrid approach for authenticating MPEG-2 streaming data
MCAM'07 Proceedings of the 2007 international conference on Multimedia content analysis and mining
An hybrid approach for efficient multicast stream authentication over unsecured channels
ProvSec'07 Proceedings of the 1st international conference on Provable security
Denial of service attack-resistant flooding authentication in wireless sensor networks
Computer Communications
Efficient data structures for tamper-evident logging
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Slow but certain wins the race: authenticated bundle communication in delay tolerant networks
Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile networks
Low cost multicast authentication via validity voting in time-triggered embedded control networks
WESS '10 Proceedings of the 5th Workshop on Embedded Systems Security
Robust and efficient authentication of video stream broadcasting
ACM Transactions on Information and System Security (TISSEC)
The ForwardDiffsig scheme for multicast authentication
IEEE/ACM Transactions on Networking (TON)
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
Integrity for the In-flight web page based on a fragile watermarking chain scheme
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication
Video streaming security: reliable hash chain mechanism using redundancy codes
Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia
Loss tolerant video streaming authentication in heterogeneous wireless networks
Computer Communications
Hash chain links resynchronization methods in video streaming security: performance comparison
Journal of Mobile Multimedia
Flooding-resilient broadcast authentication for VANETs
MobiCom '11 Proceedings of the 17th annual international conference on Mobile computing and networking
Challenging the feasibility of authentication mechanisms for P2P live streaming
Proceedings of the 6th Latin America Networking Conference
IPBio: embedding biometric data in IP header for per-packet authentication
ISPA'06 Proceedings of the 2006 international conference on Frontiers of High Performance Computing and Networking
Signature amortization using multiple connected chains
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Efficient dos resistant multicast authentication schemes
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
Information Sciences: an International Journal
Source authentication of media streaming based on chains of iso-hash clusters
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
A study on efficient key management in real time wireless sensor network
MSN'05 Proceedings of the First international conference on Mobile Ad-hoc and Sensor Networks
How to authenticate real time streams using improved online/offline signatures
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
Delayed-key message authentication for streams
TCC'10 Proceedings of the 7th international conference on Theory of Cryptography
MDS: multiplexed digital signature for real-time streaming over multi-sessions
ICOIN'05 Proceedings of the 2005 international conference on Information Networking: convergence in broadband and mobile networking
Impacts of security protocols on real-time multimedia communications
WISA'04 Proceedings of the 5th international conference on Information Security Applications
A short-lived key selection approach to authenticate data origin of multimedia stream
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
Rateless codes for the multicast stream authentication problem
IWSEC'06 Proceedings of the 1st international conference on Security
CT-RSA'07 Proceedings of the 7th Cryptographers' track at the RSA conference on Topics in Cryptology
Efficient multicast stream authentication for the fully adversarial network model
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Unconditionally secure information authentication in presence of erasures
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
IAAS: an integrity assurance service for web page via a fragile watermarking chain module
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication
Practical end-to-end web content integrity
Proceedings of the 21st international conference on World Wide Web
Containing bogus packet insertion attacks for broadcast authentication in sensor networks
ACM Transactions on Sensor Networks (TOSN)
A joint layered scheme for reliable and secure mobile JPEG-2000 streaming
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Property preserving symmetric encryption
EUROCRYPT'12 Proceedings of the 31st Annual international conference on Theory and Applications of Cryptographic Techniques
The security of ciphertext stealing
FSE'12 Proceedings of the 19th international conference on Fast Software Encryption
NSS'12 Proceedings of the 6th international conference on Network and System Security
SimplyRep: A simple and effective reputation system to fight pollution in P2P live streaming
Computer Networks: The International Journal of Computer and Telecommunications Networking
Technique for authenticating H.264/SVC and its performance evaluation over wireless mobile networks
Journal of Computer and System Sciences
Authentication of lossy data in body-sensor networks for cloud-based healthcare monitoring
Future Generation Computer Systems
Hi-index | 0.00 |