{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:16:52Z","timestamp":1725549412280},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540310129"},{"type":"electronic","value":"9783540331537"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11604938_9","type":"book-chapter","created":{"date-parts":[[2006,2,1]],"date-time":"2006-02-01T05:28:58Z","timestamp":1138771738000},"page":"108-125","source":"Crossref","is-referenced-by-count":6,"title":["Efficient Multicast Stream Authentication for the Fully Adversarial Network Model"],"prefix":"10.1007","author":[{"given":"Christophe","family":"Tartary","sequence":"first","affiliation":[]},{"given":"Huaxiong","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/3-540-47734-9_24","volume-title":"Networking - ICN 2001","author":"M. Al-Ibrahim","year":"2001","unstructured":"Al-Ibrahim, M., Pieprzyk, J.: Authenticating multicast streams in lossy channels using threshold techniques. In: Lorenz, P. (ed.) ICN 2001. LNCS, vol.\u00a02094, p. 239. Springer, Heidelberg (2001)"},{"key":"9_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1007\/3-540-45682-1_30","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, p. 514. Springer, Heidelberg (2001)"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Challal, Y., Bettahar, H., Bouabdallah, A.: A taxonomy of multicast data origin authentication: Issues and solutions. IEEE Communications Surveys and Tutorials 6 (October 2004)","DOI":"10.1109\/COMST.2004.5342292"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Challal, Y., Bouabdallah, A., Bettahar, H.: H2A: Hybrid hash-chaining scheme for adaptive multicast source authentication of media-streaming. Computer & Security 24 (February 2005)","DOI":"10.1016\/j.cose.2004.06.012"},{"key":"9_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1007\/BFb0052235","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"R. Gennaro","year":"1997","unstructured":"Gennaro, R., Rohatgi, P.: How to Sign Digital Streams. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 180\u2013197. Springer, Heidelberg (1997)"},{"key":"9_CR6","unstructured":"Golle, P., Modadugu, N.: Authenticating streamed data in the presence of random packet loss. In: NDSS 2001. Internet Society (February 2001)"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Guruswami, V., Sudan, M.: Improved decoding of Reed-Solomon and algebraic-geometric codes. IEEE Trans. Info. Theory (May 1999)","DOI":"10.1109\/18.782097"},{"key":"9_CR8","unstructured":"Lysyanskaya, A., Tamassia, R., Triandopoulos, N.: Multicast authentication in fully adversarial networks. In: IEEE Symposium on Security and Privacy (November 2003)"},{"key":"9_CR9","volume-title":"The Theory of Error-Correcting Codes","author":"F.J. MacWilliams","year":"1977","unstructured":"MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-Correcting Codes. North-Holland, Amsterdam (1977)"},{"key":"9_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1007\/0-387-34805-0_21","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"R. Merkle","year":"1990","unstructured":"Merkle, R.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 218\u2013238. Springer, Heidelberg (1990)"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Miner, S., Staddon, J.: Graph-based authentication of digital streams. In: IEEE Symposium on Security and Privacy (May 2001)","DOI":"10.1109\/SECPRI.2001.924301"},{"key":"9_CR12","unstructured":"Pannetrat, A., Molva, R.: Authenticating real time packet streams and multicasts (July 2002)"},{"key":"9_CR13","unstructured":"Park, J.M., Chong, E.K.P., Siegel, H.J.: Efficient multicast packet authentication using signature amortization. In: IEEE Symposium on Security and Privacy (May 2002)"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Park, J.M., Chong, E.K.P., Siegel, H.J.: Efficient multicast stream authentication using erasure codes. In: ACM - TISSEC, vol.\u00a06 (May 2003)","DOI":"10.1145\/762476.762480"},{"key":"9_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"799","DOI":"10.1007\/978-3-540-24768-5_86","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2004","author":"Y. Park","year":"2004","unstructured":"Park, Y., Cho, Y.: The eSAIDA stream authentication scheme. In: Lagan\u00e1, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol.\u00a03046, pp. 799\u2013807. Springer, Heidelberg (2004)"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Paxson, V.: End-to-end Internet packet dynamics. IEEE\/ACM Transactions on Networking (June 1999)","DOI":"10.1109\/90.779192"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Perrig, A., Canetti, R., Tygar, J., Song, D.: Efficient authentication and signing of multicast streams over lossy channels. In: IEEE Symposium on Security and Privacy (May 2000)","DOI":"10.1109\/SECPRI.2000.848446"},{"key":"9_CR18","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-0229-6","volume-title":"Secure Broadcast Communication in Wired and Wireless Networks","author":"A. Perrig","year":"2003","unstructured":"Perrig, A., Tygar, J.D.: Secure Broadcast Communication in Wired and Wireless Networks. Kluwer Academic Publishers, Dordrecht (2003)"},{"key":"9_CR19","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-07324-7","volume-title":"Fundamentals of Computer Security","author":"J. Pieprzyk","year":"2003","unstructured":"Pieprzyk, J., Hardjono, T., Seberry, J.: Fundamentals of Computer Security. Springer, Heidelberg (2003)"},{"key":"9_CR20","doi-asserted-by":"crossref","unstructured":"Rabin, M.O.: Efficient dispersal of information for security, load balancing, and fault tolerance. Journal of the Association for Computing machinery\u00a036 (April 1989)","DOI":"10.1145\/62044.62050"},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"Rohatgi, P.: A compact and fast hybrid signature scheme for multicast packet authentication. In: CCS 1999 (1999)","DOI":"10.1145\/319709.319722"},{"key":"9_CR22","volume-title":"Cryptography: Theory and Practice","author":"D.R. Stinson","year":"1995","unstructured":"Stinson, D.R.: Cryptography: Theory and Practice. CRC Press, Boca Raton (1995)"},{"key":"9_CR23","doi-asserted-by":"crossref","unstructured":"Wong, C.K., Lam, S.S.: Digital signatures for flows and multicasts. IEEE\/ACM Transactions on Networking\u00a07 (August 1999)","DOI":"10.1109\/90.793005"},{"key":"9_CR24","volume-title":"IEEE Infocom","author":"M. Yajnik","year":"1999","unstructured":"Yajnik, M., Moon, S., Kurose, J., Towsley, D.: Measurement and modeling of the temporal dependence in packet loss. In: IEEE Infocom. IEEE Press, Los Alamitos (1999)"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11604938_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T03:05:05Z","timestamp":1619492705000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11604938_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540310129","9783540331537"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/11604938_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}