{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:42:24Z","timestamp":1725565344122},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540220602"},{"type":"electronic","value":"9783540247685"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24768-5_86","type":"book-chapter","created":{"date-parts":[[2010,9,11]],"date-time":"2010-09-11T01:14:08Z","timestamp":1284167648000},"page":"799-807","source":"Crossref","is-referenced-by-count":10,"title":["The eSAIDA Stream Authentication Scheme"],"prefix":"10.1007","author":[{"given":"Yongsu","family":"Park","sequence":"first","affiliation":[]},{"given":"Yookun","family":"Cho","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"86_CR1","unstructured":"FIPS 180-1. Secure Hash Standard. Federal Information Processing Standard (FIPS), Publication 180-1, National Institute of Standards and Technology, US Department of Commerce, Washington D.C. (April 1995)"},{"key":"86_CR2","series-title":"Lecture Notes in Computer Science","first-page":"363","volume-title":"STACS 96","author":"D. Bleichenbacher","year":"1996","unstructured":"Bleichenbacher, D., Maurer, U.: Optimal tree-based one-time digital signature schemes. In: Puech, C., Reischuk, R. (eds.) STACS 1996. LNCS, vol.\u00a01046, pp. 363\u2013374. Springer, Heidelberg (1996)"},{"key":"86_CR3","doi-asserted-by":"crossref","unstructured":"Borella, M.S., Swider, D., Uludag, S., Brewster, G.: Internet Packet Loss: Measurement and Implications for End-to-End QoS. In: International Conference on Parallel Processing (1998)","DOI":"10.1109\/ICPPW.1998.721868"},{"key":"86_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1007\/BFb0052235","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"R. Gennaro","year":"1997","unstructured":"Gennaro, R., Rohatgi, P.: How to Sign Digital Streams. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 180\u2013197. Springer, Heidelberg (1997)"},{"key":"86_CR5","unstructured":"Golle, P., Modadugu, N.: Authenticating Streamed Data in the Presence of Random Packet Loss. In: NDSS 2001, pp. 13\u201322 (2001)"},{"key":"86_CR6","volume-title":"Handbook of AppliedCrypto graphy","author":"A.J. Menezes","year":"1997","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of AppliedCrypto graphy. CRC Press, Boca Raton (1997)"},{"key":"86_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1007\/3-540-48184-2_32","volume-title":"Advances in Cryptology - CRYPTO \u201987","author":"R.C. Merkle","year":"1988","unstructured":"Merkle, R.C.: A digital signature based on a conventional encryption function. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol.\u00a0293, pp. 369\u2013378. Springer, Heidelberg (1988)"},{"key":"86_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1007\/0-387-34805-0_21","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"R.C. Merkle","year":"1990","unstructured":"Merkle, R.C.: A Certified Digital Signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 218\u2013238. Springer, Heidelberg (1990)"},{"issue":"2","key":"86_CR9","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1145\/762476.762480","volume":"6","author":"J.M. Park","year":"2003","unstructured":"Park, J.M., Chong, E.K.P., Siegel, H.J.: Efficient Multicast Packet Authentication Using Signature Amoritization. ACM Transactions on Information and System Security\u00a06(2), 258\u2013285 (2003)","journal-title":"ACM Transactions on Information and System Security"},{"key":"86_CR10","doi-asserted-by":"crossref","unstructured":"Perrig, A.: The BiBa One-Time Signature and Broadcast Authentication Protocol. In: 8th ACM Conference on Computer and Communication Security, November 2001, pp. 28\u201337 (2001)","DOI":"10.1145\/501983.501988"},{"key":"86_CR11","doi-asserted-by":"crossref","unstructured":"Perrig, A., Canetti, R., Song, D., Tygar, J.D.: Efficient Authentication and Signing of Multicast Streams over Lossy Channels. In: Proceedings of IEEE Security and Privacy Symposium (May 2000)","DOI":"10.1109\/SECPRI.2000.848446"},{"issue":"2","key":"86_CR12","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1145\/62044.62050","volume":"36","author":"M.O. Rabin","year":"1989","unstructured":"Rabin, M.O.: Efficient dispersal of information for security, load balancing and fault tolerance. Journal of the Association for Computing Machinery\u00a036(2), 335\u2013348 (1989)","journal-title":"Journal of the Association for Computing Machinery"},{"issue":"2","key":"86_CR13","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adelman, L.M.: A Method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM\u00a021(2), 120\u2013126 (1978)","journal-title":"Communications of the ACM"},{"key":"86_CR14","doi-asserted-by":"crossref","unstructured":"Rohatgi, P.: A Compact and Fast Hybrid Signature Scheme for Multicast Packet Authentication. In: 6th ACM Conference on Computer and Communication Security (November 1999)","DOI":"10.1145\/319709.319722"},{"issue":"4","key":"86_CR15","doi-asserted-by":"publisher","first-page":"502","DOI":"10.1109\/90.793005","volume":"7","author":"C.K. Wong","year":"1999","unstructured":"Wong, C.K., Lam, S.S.: Digital Signatures for Flows and Multicasts. IEEE\/ACM Transactions on Networking\u00a07(4), 502\u2013513 (1999)","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"86_CR16","doi-asserted-by":"crossref","unstructured":"Yajnik, M., Moon, S., Kurose, J., Towsley, D.: Measurement and modelling of the temporal dependence in packet loss. In: IEEE INFOCOM 1999 (1999)","DOI":"10.1109\/INFCOM.1999.749301"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24768-5_86.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T03:08:58Z","timestamp":1620011338000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24768-5_86"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540220602","9783540247685"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24768-5_86","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}