Authenticated multicast immune to denial-of-service attack
Proceedings of the 2002 ACM symposium on Applied computing
Efficient Object-Based Stream Authentication
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
Efficient multicast stream authentication using erasure codes
ACM Transactions on Information and System Security (TISSEC)
Lightweight, pollution-attack resistant multicast authentication scheme
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
An efficient broadcast authentication scheme in wireless sensor networks
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Mitigating DoS attacks against broadcast authentication in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
SecureStream: An intrusion-tolerant protocol for live-streaming dissemination
Computer Communications
Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents
International Journal of Security and Networks
Efficient multicast stream authentication for the fully adversarial network model
International Journal of Security and Networks
ISNN '07 Proceedings of the 4th international symposium on Neural Networks: Advances in Neural Networks
PEAC: a probabilistic, efficient, and resilient authentication protocol for broadcast communications
Proceedings of the 4th international conference on Security and privacy in communication netowrks
The case of the fake Picasso: preventing history forgery with secure provenance
FAST '09 Proccedings of the 7th conference on File and storage technologies
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Preventing history forgery with secure provenance
ACM Transactions on Storage (TOS)
RLH: receiver driven layered hash-chaining for multicast data origin authentication
Computer Communications
ShortPK: A short-term public key scheme for broadcast authentication in sensor networks
ACM Transactions on Sensor Networks (TOSN)
Ensuring Authentication of Digital Information Using Cryptographic Accumulators
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Authenticated error-correcting codes with applications to multicast authentication
ACM Transactions on Information and System Security (TISSEC)
Achieving end-to-end authentication in intermediary-enabled multimedia delivery systems
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
Combining prediction hashing and MDS codes for efficient multicast stream authentication
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
A hybrid approach for authenticating MPEG-2 streaming data
MCAM'07 Proceedings of the 2007 international conference on Multimedia content analysis and mining
An hybrid approach for efficient multicast stream authentication over unsecured channels
ProvSec'07 Proceedings of the 1st international conference on Provable security
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Denial of service attack-resistant flooding authentication in wireless sensor networks
Computer Communications
Slow but certain wins the race: authenticated bundle communication in delay tolerant networks
Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile networks
The ForwardDiffsig scheme for multicast authentication
IEEE/ACM Transactions on Networking (TON)
Signature amortization using multiple connected chains
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Source authentication of media streaming based on chains of iso-hash clusters
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
How to authenticate real time streams using improved online/offline signatures
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
Resource requirement analysis for a predictive-hashing based multicast authentication protocol
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
Multi-Source stream authentication framework in case of composite MPEG-4 stream
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
Rateless codes for the multicast stream authentication problem
IWSEC'06 Proceedings of the 1st international conference on Security
Achieving multicast stream authentication using MDS codes
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
CT-RSA'07 Proceedings of the 7th Cryptographers' track at the RSA conference on Topics in Cryptology
Efficient multicast stream authentication for the fully adversarial network model
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Containing bogus packet insertion attacks for broadcast authentication in sensor networks
ACM Transactions on Sensor Networks (TOSN)
NSS'12 Proceedings of the 6th international conference on Network and System Security
Technique for authenticating H.264/SVC and its performance evaluation over wireless mobile networks
Journal of Computer and System Sciences
Hi-index | 0.00 |
Abstract: We consider the authentication of digital streams over a lossy network. The overall approach taken is graph-based, as this yields simple methods for controlling overhead, delay, and the ability to authenticate, while serving to unify many previously known hash- and MAC-based techniques. The loss pattern of the network is defined probabilistically, allowing both bursty and random packet loss to be modeled. Our authentication schemes are customizable by the sender of the stream; that is, within reasonable constraints on the input parameters, we provide schemes that achieve the desired authentication probability while meeting the input upper bound on the overhead per packet. In addition, we demonstrate that some of the shortcomings of previously known schemes correspond to easily identifiable properties of a graph, and hence, may be more easily avoided by taking a graph-based approach to designing authentication schemes.