Lightweight, pollution-attack resistant multicast authentication scheme
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
An efficient broadcast authentication scheme in wireless sensor networks
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Efficient security mechanisms for overlay multicast based content delivery
Computer Communications
Mitigating DoS attacks against broadcast authentication in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification
ACM Transactions on Information and System Security (TISSEC)
SecureStream: An intrusion-tolerant protocol for live-streaming dissemination
Computer Communications
Defence against packet injection in ad hoc networks
International Journal of Security and Networks
Slander-resistant forwarding isolation in ad hoc networks
International Journal of Mobile Network Design and Innovation
PEAC: a probabilistic, efficient, and resilient authentication protocol for broadcast communications
Proceedings of the 4th international conference on Security and privacy in communication netowrks
ShortPK: A short-term public key scheme for broadcast authentication in sensor networks
ACM Transactions on Sensor Networks (TOSN)
Authenticated error-correcting codes with applications to multicast authentication
ACM Transactions on Information and System Security (TISSEC)
Slow but certain wins the race: authenticated bundle communication in delay tolerant networks
Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile networks
Private yet abuse resistant open publishing
Proceedings of the 15th international conference on Security protocols
Resource requirement analysis for a predictive-hashing based multicast authentication protocol
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
Efficient security mechanisms for overlay multicast-based content distribution
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Containing bogus packet insertion attacks for broadcast authentication in sensor networks
ACM Transactions on Sensor Networks (TOSN)
NSS'12 Proceedings of the 6th international conference on Network and System Security
Technique for authenticating H.264/SVC and its performance evaluation over wireless mobile networks
Journal of Computer and System Sciences
Hi-index | 0.00 |
We use expander graphs to provide efficient new constructions for two security applications: authentication of long digital streams over lossy networks and building scalable,robust overlay networks. Here is a summaryof our contributions: (1) To authenticate long digital streams over lossy networks,we provide a construction with a provable lower bound on the ability to authenticate a packet and that lower bound is independent of the size of the graph.To achieve this,we present an authentication expander graph with constant degree.(Previous work,such as [MS01],used authentication graphs but requir ed graphs with degree linear in the number of vertices. ) (2) To build efficient,robust,and scalable overlay networks,we provide a construction using undirected expander graphs with a provable lower bound on the ability of a broadcast message to successfully reach any receiver.This also gives us a new,more efficient solution to the decentralized certicate revocation problem [WLM00].