Next: About this document
Up: The TESLA Broadcast Authentication
Previous: Acknowledgments
ifundefinedsend ifundefinedxor
ifundefinedrandom
References
- 1
-
R. Anderson, F. Bergadano, B. Crispo, J. Lee, C. Manifavas, and R. Needham.
A new family of authentication protocols.
ACM Operating Systems Review, 32(4):9-20, October 1998.
- 2
-
F. Bergadano, D. Cavagnino, and B. Crispo.
Chained stream authentication.
In Selected Areas in Cryptography, 7th Annual International
Workshop, SAC 2000, volume 2012 of Lecture Notes in Computer Science,
pages 144-157, August 2000.
- 3
-
F. Bergadano, D. Cavalino, and B. Crispo.
Individual single source authentication on the mbone.
In ICME 2000, Aug 2000.
- 4
-
D. Boneh, G. Durfee, and M. Franklin.
Lower bounds for multicast message authentication.
In Advances in Cryptology -- EUROCRYPT '2001, volume 2045
of Lecture Notes in Computer Science, pages 434-450, 2001.
- 5
-
B. Briscoe.
FLAMeS: Fast, Loss-Tolerant Authentication
of Multicast Streams.
Technical report, BT Research, 2000.
http://www.labs.bt.com/people/briscorj/papers.html.
- 6
-
A. Buldas, P. Laud, H. Lipmaa, and J. Villemson.
Time-stamping with binary linking schemes.
In Advances in Cryptology -- CRYPTO '98, volume 1462 of
Lecture Notes in Computer Science, pages 486-501, 1998.
- 7
-
R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas.
Multicast security: A taxonomy and some efficient constructions.
In INFOCOMM'99, pages 708-716, March 1999.
- 8
-
S. Cheung.
An efficient message authentication scheme for link state routing.
In 13th Annual Computer Security Applications Conference, pages
90-98, 1997.
- 9
-
D. Coppersmith and M. Jakobsson.
Almost optimal hash sequence traversal.
In Proceedings of the Fourth Conference on Financial
Cryptography (FC '02), Lecture Notes in Computer Science, 2002.
- 10
-
Y. Desmedt and Y. Frankel.
Shared generation of authenticators and signatures.
In Advances in Cryptology -- CRYPTO '91, volume 576 of
Lecture Notes in Computer Science, pages 457-469, 1992.
- 11
-
Y. Desmedt, Y. Frankel, and M. Yung.
Multi-receiver / multi-sender network security: Efficient
authenticated multicast / feedback.
In Proceedings IEEE Infocom '92, pages 2045-2054, 1992.
- 12
-
Y. Desmedt and M. Yung.
Arbitrated unconditionally secure authentication can be
unconditionally protected against arbiter's attacks.
In Advances in Cryptology -- CRYPTO '90, volume 537 of
Lecture Notes in Computer Science, pages 177-188, 1991.
- 13
-
F. Fujii, W. Kachen, and K. Kurosawa.
Combinatorial bounds and design of broadcast authentication.
IEICE Transactions, E79-A(4):502-506, 1996.
- 14
-
R. Gennaro and P. Rohatgi.
How to sign digital streams.
In Advances in Cryptology -- CRYPTO '97, volume 1294 of
Lecture Notes in Computer Science, pages 180-197, 1997.
- 15
-
S. Haber and W. Stornetta.
How to time-stamp a digital document.
In Advances in Cryptology -- CRYPTO '90, volume 537 of
Lecture Notes in Computer Science, pages 437-455, 1991.
- 16
-
N. Haller.
The S/Key one-time password system.
In Proceedings of the Symposium on Network and Distributed
Systems Security, pages 151-157. Internet Society, February 1994.
- 17
-
H. Holbrook and D. Cheriton.
IP multicast channels: EXPRESS support for large-scale
single-source applications.
In Proceedings of ACM SIGCOMM '99, September 1999.
- 18
-
Y.-C. Hu, A. Perrig, and D. B. Johnson.
Ariadne: A secure on-demand routing protocol for ad hoc networks.
In Proceedings of the Eighth ACM International Conference on
Mobile Computing and Networking (Mobicom 2002), September 2002.
To appear.
- 19
-
M. Jakobsson.
Fractal hash sequence representation and traversal.
In Proceedings of the 2002 IEEE International Symposium on
Information Theory (ISIT '02), pages 437-444, July 2002.
- 20
-
K. Kurosawa and S. Obana.
Characterization of (k,n) multi-receiver authentication.
In Proceedings of the 2nd Australasian Conference on Information
Security and Privacy (ACISP '97), volume 1270 of Lecture Notes in
Computer Science, pages 205-215, 1997.
- 21
-
L. Lamport.
Password authentication with insecure communication.
Communications of the ACM, 24(11):770-772, November 1981.
- 22
-
L. Lamport and P. Melliar-Smith.
Synchronizing clocks in the presence of faults.
Journal of the ACM, 32(1):52-78, 1985.
- 23
-
H. Lipmaa.
Secure and Efficient Time-Stamping Systems.
PhD thesis, Department of Mathematics, University of Tartu, Estonia,
April 1999.
- 24
-
D. Mills.
Network Time Protocol (version 3) specification, implementation
and analysis.
Internet Request for Comment RFC 1305, Internet Engineering Task
Force, March 1992.
- 25
-
S. Miner and J. Staddon.
Graph-based authentication of digital streams.
In Proceedings of the IEEE Symposium on Research in Security
and Privacy, pages 232-246, May 2001.
- 26
-
Multicast security ietf working group (msec).
http://www.ietf.org/html.charters/msec-charter.html, 2002.
- 27
-
A. Perrig, R. Canetti, D. Song, and J. D. Tygar.
Efficient and secure source authentication for multicast.
In Proceedings of the Symposium on Network and Distributed
Systems Security (NDSS 2001), pages 35-46. Internet Society, February 2001.
- 28
-
A. Perrig, R. Canetti, J. D. Tygar, and D. Song.
Efficient authentication and signature of multicast streams over
lossy channels.
In Proceedings of the IEEE Symposium on Research in Security
and Privacy, pages 56-73, May 2000.
- 29
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar.
SPINS: Security protocols for sensor networks.
In Proceedings of Seventh Annual International Conference on
Mobile Computing and Networks (Mobicom 2001), pages 189-199, 2001.
- 30
-
A. Perrig and J. D. Tygar.
Security Protocols for Broadcast Networks.
Kluwer Academic Publishers, 2002.
To appear.
- 31
-
M. Reiter.
A security architecture for fault-tolerant systems.
PhD thesis, Department of Computer Science, Cornell University,
August 1993.
- 32
-
M. Reiter, K. Birman, and R. van Renesse.
A security architecture for fault-tolerant systems.
ACM Transactions on Computer Systems, 12(4):340-371,
November 1994.
- 33
-
P. Rohatgi.
A compact and fast hybrid signature scheme for multicast packet.
In Proceedings of the 6th ACM Conference on Computer and
Communications Security, pages 93-100, November 1999.
- 34
-
R. Safavi-Naini and H. Wang.
New results on multireceiver authentication codes.
In Advances in Cryptology -- EUROCRYPT '98, volume 1403 of
Lecture Notes in Computer Science, pages 527-541, 1998.
- 35
-
R. Safavi-Naini and H. Wang.
Multireceiver authentication codes: Models, bounds, constructions and
extensions.
Information and Computation, 151(1/2):148-172, 1999.
- 36
-
G. Simmons.
A cartesian product construction for unconditionally secure
authentication codes that permit arbitration.
Journal of Cryptology, 2(2):77-104, 1990.
- 37
-
B. Simons, J. Lundelius-Welch, and N. Lynch.
An overview of clock synchronization.
In B. Simons and A. Spector, editors, Fault-Tolerant Distributed
Computing, number 448 in LNCS, pages 84-96, 1990.
- 38
-
D. Song, D. Zuckerman, and J. D. Tygar.
Expander graphs for digital stream authentication and robust overlay
networks.
In Proceedings of the IEEE Symposium on Research in Security
and Privacy, pages 258-270, May 2002.
- 39
-
C. Wong and S. Lam.
Digital signatures for flows and multicasts.
In IEEE ICNP `98, 1998.
- 40
-
Source-Specific Multicast IETF working group (SSM).
http://www.ietf.org/html.charters/ssm-charter.html, 2002.
Next: About this document
Up: The TESLA Broadcast Authentication
Previous: Acknowledgments
Adrian Perrig
Mon Aug 5 22:55:55 PDT 2002