{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:39:52Z","timestamp":1750307992303,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,3,21]],"date-time":"2006-03-21T00:00:00Z","timestamp":1142899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,3,21]]},"DOI":"10.1145\/1128817.1128840","type":"proceedings-article","created":{"date-parts":[[2006,5,8]],"date-time":"2006-05-08T21:40:43Z","timestamp":1147124443000},"page":"148-156","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Lightweight, pollution-attack resistant multicast authentication scheme"],"prefix":"10.1145","author":[{"given":"Ya-Jeng","family":"Lin","sequence":"first","affiliation":[{"name":"National Chiao Tung University, University of California Berkeley, Hsinchu, Taiwan, ROC"}]},{"given":"Shiuhpyng","family":"Shieh","sequence":"additional","affiliation":[{"name":"National Chiao Tung University, University of California Berkeley, Hsinchu, Taiwan, ROC"}]},{"given":"Warren W.","family":"Lin","sequence":"additional","affiliation":[{"name":"National Chiao Tung University, University of California Berkeley, Hsinchu, Taiwan, ROC"}]}],"member":"320","published-online":{"date-parts":[[2006,3,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the 11th Annual Network and Distributed System Security Symposium (NDSS'04)","author":"Karlof Chris","year":"2004","unstructured":"Chris Karlof , Naveen Sastry , Yaping Li , Adrian Perrig , and J.D. Tygar , \" Distillation Codes and Applications to DoS Resistant Multicast Authentication \", In Proceedings of the 11th Annual Network and Distributed System Security Symposium (NDSS'04) , February 2004 . Chris Karlof, Naveen Sastry, Yaping Li, Adrian Perrig, and J.D. Tygar, \"Distillation Codes and Applications to DoS Resistant Multicast Authentication\", In Proceedings of the 11th Annual Network and Distributed System Security Symposium (NDSS'04), February 2004."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/762476.762480"},{"key":"e_1_3_2_1_3_1","first-page":"227","volume-title":"Proceedings of the IEEE Symposium on Research in Security and Privacy","author":"Park J. M.","year":"2002","unstructured":"J. M. Park , E. K. Chong , and H. J. Siegel . Efficient multicast packet authentication using signature amortization . In Proceedings of the IEEE Symposium on Research in Security and Privacy , pages 227 -- 240 , May 2002 . J. M. Park, E. K. Chong, and H. J. Siegel. Efficient multicast packet authentication using signature amortization. In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 227--240, May 2002."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/501983.501988"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/646039.678322"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1980.10006"},{"key":"e_1_3_2_1_7_1","volume-title":"43rd Annual IEEE Symposium on Foundations of Computer Science (FOCS'02)","author":"Luby M.","year":"2002","unstructured":"M. Luby . LT codes. In 43rd Annual IEEE Symposium on Foundations of Computer Science (FOCS'02) , 2002 . M. Luby. LT codes. In 43rd Annual IEEE Symposium on Foundations of Computer Science (FOCS'02), 2002."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.910575"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/62044.62050"},{"key":"e_1_3_2_1_10_1","first-page":"227","volume-title":"IEEE Symposium on Security and Privacy","author":"Park J. M.","year":"2002","unstructured":"J. M. Park , E. K. P. Chong , and H. J. Siegel . Efficient multicast packet authentication using signature amortization . In IEEE Symposium on Security and Privacy , pages 227 -- 240 , 2002 . J. M. Park, E. K. P. Chong, and H. J. Siegel. Efficient multicast packet authentication using signature amortization. In IEEE Symposium on Security and Privacy, pages 227--240, 2002."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/762476.762480"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1137\/0108018"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/164051.164075"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1980.10006"},{"key":"e_1_3_2_1_15_1","first-page":"13","volume-title":"Proceedings of the Symposium on Network and Distributed Systems Security (NDSS 2001","author":"Golle P.","year":"2001","unstructured":"P. Golle and N. Modadugu . Authenticating streamed data in the presence of random packet loss . In Proceedings of the Symposium on Network and Distributed Systems Security (NDSS 2001 ), pages 13 -- 22 . Internet Society , Feb. 2001 . P. Golle and N. Modadugu. Authenticating streamed data in the presence of random packet loss. In Proceedings of the Symposium on Network and Distributed Systems Security (NDSS 2001), pages 13--22. Internet Society, Feb. 2001."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/882495.884428"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the Symposium on Network and Distributed System Security Symposium (NDSS 2003","author":"Pannetrat A.","year":"2003","unstructured":"A. Pannetrat and R. Molva . Efficient multicast packet authentication . In Proceedings of the Symposium on Network and Distributed System Security Symposium (NDSS 2003 ). Internet Society , Feb. 2003 . A. Pannetrat and R. Molva. Efficient multicast packet authentication. In Proceedings of the Symposium on Network and Distributed System Security Symposium (NDSS 2003). Internet Society, Feb. 2003."},{"key":"e_1_3_2_1_18_1","first-page":"56","volume-title":"Proceedings of the IEEE Symposium on Research in Security and Privacy","author":"Perrig A.","year":"2000","unstructured":"A. Perrig , R. Canetti , J. D. Tygar , and D. Song . Efficient authentication and signature of multicast streams over lossy channels . In Proceedings of the IEEE Symposium on Research in Security and Privacy , pages 56 -- 73 , May 2000 . A. Perrig, R. Canetti, J. D. Tygar, and D. Song. Efficient authentication and signature of multicast streams over lossy channels. In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 56--73, May 2000."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/829514.830523"},{"key":"e_1_3_2_1_20_1","first-page":"198","volume-title":"Proceedings on the 6th International Conference on Network Protocols (ICNP '98)","author":"Wong C.","year":"1998","unstructured":"C. Wong and S. Lam . Digital signatures for flows and multicasts . In Proceedings on the 6th International Conference on Network Protocols (ICNP '98) , pages 198 -- 209 . IEEE, October 1998 . C. Wong and S. Lam. Digital signatures for flows and multicasts. In Proceedings on the 6th International Conference on Network Protocols (ICNP '98), pages 198--209. IEEE, October 1998."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/26.241748"},{"key":"e_1_3_2_1_22_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1007\/BFb0052235","volume-title":"Advances in Cryptology","author":"Gennaro R.","year":"1997","unstructured":"R. Gennaro and P. Rohatgi . How to sign digital streams . In Advances in Cryptology , volume 1294 of Lecture Notes in Computer Science , pages 180 -- 197 . Springer , 1997 . R. Gennaro and P. Rohatgi. How to sign digital streams. In Advances in Cryptology, volume 1294 of Lecture Notes in Computer Science, pages 180--197. Springer, 1997."}],"event":{"name":"Asia CCS06: ACM Symposium on Information, Computer and Communications Security 2006","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Taipei Taiwan","acronym":"Asia CCS06"},"container-title":["Proceedings of the 2006 ACM Symposium on Information, computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1128817.1128840","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1128817.1128840","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:06:17Z","timestamp":1750259177000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1128817.1128840"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,3,21]]},"references-count":22,"alternative-id":["10.1145\/1128817.1128840","10.1145\/1128817"],"URL":"https:\/\/doi.org\/10.1145\/1128817.1128840","relation":{},"subject":[],"published":{"date-parts":[[2006,3,21]]},"assertion":[{"value":"2006-03-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}