Author:
Mohan Yogendra,Krishna C. Rama,Singh Karan
Reference37 articles.
1. Challal Y, Bettahar H, Bouabdallah (2004) A taxonomy of multicast data origin authentication: issues and solutions. IEEE Comm Surveys Tutorials 6(3):34–57
2. Wang Q, Nahrstedt K (2009) Time valid one-time signature for time-critical multicast data authentication. In: IEEE INFOCOM, Rio de Janeiro
3. Balasubramanian K, Roopa R (2012) HTSS: hash tree signature scheme for multicast authentication. IJCA proceedings on international conference in recent trends in computational methods, communication and controls (ICON3C), no 6, pp 28–32, Apr 2012
4. Berbecaru D, Albertalli L, Lioy A (2010) The forward diffusion scheme for multicast authentication. IEEE/ACM Trans Netw 18(6):1855–1868
5. Perrig A, Canetti R, Song D, Tygar J (2001) Efficient and secure source authentication for multicast. In: Proceedings of network and distributed system security symposium (NDSS-2001), vol 1, pp 35–46
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献