搜索结果: 1-3 共查到“Stream Authentication”相关记录3条 . 查询时间(0.14 秒)
A Tree-based Model of Unicast Stream Authentication
Since many authentication schemes have been broken, we will prove our solutions.
2008/11/5
When proving the security of a message authentication scheme, the messages are considered
to be atomic objects. Straightforward application of such schemes to some information resources
may introduc...
A coding approach to the multicast stream authentication problem
Stream authentication Polynomial reconstruction Rateless codes Erasure codes
2012/12/3
We study the multicast stream authentication problem when an opponent can drop, reorder and introduce data packets into the communication channel. In such a
model, packet overhead and computing effic...
An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels
Stream Authentication Polynomial Reconstruction Unsecured Channel Merkle Hash Tree Erasure Code
2012/12/3
We study the multicast stream authentication problem when an opponent can drop, reorder and inject data packets into the communication channel. In
this context, bandwidth limitation and fast authenti...