{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:45:12Z","timestamp":1725471912199},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540476993"},{"type":"electronic","value":"9783540477006"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11908739_10","type":"book-chapter","created":{"date-parts":[[2006,10,11]],"date-time":"2006-10-11T11:19:02Z","timestamp":1160565542000},"page":"136-151","source":"Crossref","is-referenced-by-count":4,"title":["Rateless Codes for the Multicast Stream Authentication Problem"],"prefix":"10.1007","author":[{"given":"Christophe","family":"Tartary","sequence":"first","affiliation":[]},{"given":"Huaxiong","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1007\/3-540-48071-4_33","volume-title":"Advances in Cryptology - CRYPTO \u201992","author":"C. Blundo","year":"1993","unstructured":"Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-secure key distribution for dynamic conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol.\u00a0740, pp. 471\u2013486. Springer, Heidelberg (1993)"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Byers, J.W., Luby, M., Mitzenmacher, M.: A digital fountain approach to asynchronous reliable multicast. IEEE Journal on Selected Areas in Communications, 20 (October 2002)","DOI":"10.1109\/JSAC.2002.803996"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Challal, Y., Bettahar, H., Bouabdallah, A.: A taxonomy of multicast data origin authentication: Issues and solutions. IEEE Communications Surveys and Tutorials\u00a06 (October 2004)","DOI":"10.1109\/COMST.2004.5342292"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Desmedt, Y., Frankel, Y., Yung, M.: Multi-receiver\/multi-sender network security: Efficient authenticated multicast\/feedback. In: INFOCOM 1992 (May 1992)","DOI":"10.1109\/INFCOM.1992.263476"},{"key":"10_CR5","unstructured":"Etesami, O., Molkaraie, M., Shokrollahi, A.: Raptor codes on symmetric channels (preprint, 2003), available online at: http:\/\/www.cs.berkeley.edu\/~etesami\/raptor.pdf"},{"key":"10_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1007\/BFb0052235","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"R. Gennaro","year":"1997","unstructured":"Gennaro, R., Rohatgi, P.: How to sign digital streams. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 180\u2013197. Springer, Heidelberg (1997)"},{"key":"10_CR7","unstructured":"Golle, P., Modadugu, N.: Authenticating streamed data in the presence of random packet loss. In: Proceedings of the Symposium on Network and Distributed Systems Security (NDSS 2001), Internet Society (February 2001)"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Guruswami, V., Sudan, M.: Improved decoding of Reed-Solomon and algebraic-geometric codes. IEEE Transactions on Information Theory (May 1999)","DOI":"10.1109\/18.782097"},{"key":"10_CR9","unstructured":"Harrelson, C., Ip, L., Wang, W.: Limited randomness LT codes. In: 41st Annual Allerton Conference on Communication, Control and Computing (October 2003)"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Karp, R., Luby, M., Shokrollahi, A.: Finite length analysis of LT codes. In: International Symposium on Information Theory (June 2004)","DOI":"10.1109\/ISIT.2004.1365074"},{"key":"10_CR11","volume-title":"Introduction to Finite Fields and their Applications - Revised Edition","author":"R. Lidl","year":"2000","unstructured":"Lidl, R., Niederreiter, H.: Introduction to Finite Fields and their Applications - Revised Edition. Cambridge University Press, Cambridge (2000)"},{"key":"10_CR12","volume-title":"43rd Annual IEEE Symposium on Foundations of Computer Science","author":"M. Luby","year":"2002","unstructured":"Luby, M.: LT codes. In: 43rd Annual IEEE Symposium on Foundations of Computer Science. IEEE Computer Society Press, Los Alamitos (2002)"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Luby, M., Mitzenmacher, M., Shokrollahi, M., Spielman, D.: Efficient erasure correcting codes. IEEE Transactions on Information Theory 47 (February 2001)","DOI":"10.1109\/18.910575"},{"key":"10_CR14","unstructured":"Lysyanskaya, A., Tamassia, R., Triandopoulos, N.: Multicast authentication in fully adversarial networks. In: IEEE Symposium on Security and Privacy (November 2003)"},{"key":"10_CR15","unstructured":"Maymounkov, P.: Online codes. Technical report, New York University (November 2002)"},{"key":"10_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1007\/0-387-34805-0_21","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"R. Merkle","year":"1990","unstructured":"Merkle, R.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 218\u2013238. Springer, Heidelberg (1990)"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Miner, S., Staddon, J.: Graph-based authentication of digital streams. In: IEEE Symposium on Security and Privacy (May 2001)","DOI":"10.1109\/SECPRI.2001.924301"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Palanki, R., Yedidia, J.S.: Rateless codes on noisy channels. In: 38th Annual Conference on Information Sciences and Systems (March 2004)","DOI":"10.1109\/ISIT.2004.1365075"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Pannetrat, A., Molva, R.: Authenticating real time packet streams and multicasts. In: 7th International Symposium on Computers and Communications (July 2002)","DOI":"10.1109\/ISCC.2002.1021720"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Paxson, V.: End-to-end Internet packet dynamics. IEEE\/ACM Transactions on Networking (June 1999)","DOI":"10.1109\/90.779192"},{"key":"10_CR21","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-0229-6","volume-title":"Secure Broadcast Communication in Wired and Wireless Networks","author":"A. Perrig","year":"2003","unstructured":"Perrig, A., Tygar, J.D.: Secure Broadcast Communication in Wired and Wireless Networks. Kluwer Academic Publishers, Dordrecht (2003)"},{"key":"10_CR22","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-07324-7","volume-title":"Fundamentals of Computer Security","author":"J. Pieprzyk","year":"2003","unstructured":"Pieprzyk, J., Hardjono, T., Seberry, J.: Fundamentals of Computer Security. Springer, Heidelberg (2003)"},{"key":"10_CR23","doi-asserted-by":"publisher","DOI":"10.1201\/9781420027433","volume-title":"Conditional Measures and Applications","author":"M.M. Rao","year":"2005","unstructured":"Rao, M.M.: Conditional Measures and Applications, 2nd edn. CRC Press, Boca Raton (2005)","edition":"2"},{"key":"10_CR24","doi-asserted-by":"crossref","unstructured":"Rohatgi, P.: A compact and fast hybrid signature scheme for multicast packet authentication. In: 6th ACM Conference on Computer and Communications Security (1999)","DOI":"10.1145\/319709.319722"},{"key":"10_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1007\/BFb0054151","volume-title":"Advances in Cryptology - EUROCRYPT \u201998","author":"R. Safavi-Naini","year":"1998","unstructured":"Safavi-Naini, R., Wang, H.: New results on multi-receiver authentication code. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol.\u00a01403, pp. 527\u2013541. Springer, Heidelberg (1998)"},{"key":"10_CR26","unstructured":"Shokrollahi, A.: Raptor codes. Technical report, Digital Fountain (June 2003)"},{"key":"10_CR27","volume-title":"Cryptography: Theory and Practice","author":"D.R. Stinson","year":"1995","unstructured":"Stinson, D.R.: Cryptography: Theory and Practice. CRC Press, Boca Raton (1995)"},{"key":"10_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1007\/11604938_9","volume-title":"Information Security Applications","author":"C. Tartary","year":"2006","unstructured":"Tartary, C., Wang, H.: Efficient multicast stream authentication for the fully adversarial network. In: Song, J.-S., Kwon, T., Yung, M. (eds.) WISA 2005. LNCS, vol.\u00a03786, pp. 108\u2013125. Springer, Heidelberg (2006)"},{"key":"10_CR29","doi-asserted-by":"crossref","unstructured":"Wong, C.K., Lam, S.S.: Digital signatures for flows and multicasts. IEEE\/ACM Transactions on Networking \u00a07 (August 1999)","DOI":"10.1109\/90.793005"},{"key":"10_CR30","doi-asserted-by":"crossref","unstructured":"Yajnik, M., Moon, S., Kurose, J., Towsley, D.: Measurement and modeling of the temporal dependence in packet loss. In: IEEE Conference on Computer Communications (1999)","DOI":"10.1109\/INFCOM.1999.749301"}],"container-title":["Lecture Notes in Computer Science","Advances in Information and Computer Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11908739_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T14:57:40Z","timestamp":1605625060000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11908739_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540476993","9783540477006"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/11908739_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}