On-the-fly verification of rateless erasure codes for efficient content distribution
MN Krohn, MJ Freedman… - IEEE Symposium on …, 2004 - ieeexplore.ieee.org
The quality of peer-to-peer content distribution can suffer when malicious participants
intentionally corrupt content. Some systems using simple block-by-block downloading can …
intentionally corrupt content. Some systems using simple block-by-block downloading can …
Multicast authentication in the smart grid with one-time signature
Multicast has been envisioned to be useful in many smart grid applications such as demand-
response, wide area protection, in-substation protection and various operation and control …
response, wide area protection, in-substation protection and various operation and control …
Mitigating DoS attacks against broadcast authentication in wireless sensor networks
Broadcast authentication is a critical security service in wireless sensor networks. There are
two general approaches for broadcast authentication in wireless sensor networks: digital …
two general approaches for broadcast authentication in wireless sensor networks: digital …
Flooding-resilient broadcast authentication for vanets
Digital signatures are one of the fundamental security primitives in Vehicular Ad-Hoc
Networks (VANETs) because they provide authenticity and non-repudiation in broadcast …
Networks (VANETs) because they provide authenticity and non-repudiation in broadcast …
Chaining watermarks for detecting malicious modifications to streaming data
Authenticating streaming data is a very important research area due to its wide range of
applications. Previous technologies mainly focused on authenticating data packets at the IP …
applications. Previous technologies mainly focused on authenticating data packets at the IP …
Time valid one-time signature for time-critical multicast data authentication
It is challenging to provide authentication to time-critical multicast data, where low end-to-
end delay is of crucial importance. Consequently, it requires not only efficient authentication …
end delay is of crucial importance. Consequently, it requires not only efficient authentication …
Efficient local secret sharing for distributed blockchain systems
Blockchain systems store transaction data in the form of a distributed ledger where each
peer is to maintain an identical copy. Blockchain systems resemble repetition codes …
peer is to maintain an identical copy. Blockchain systems resemble repetition codes …
[PDF][PDF] Absicherung der some/IP kommunikation bei adaptive autosar
J Kreissl - 2017 - scholar.archive.org
Kurzfassung Die Entwicklung einer neuen Generation vernetzter,(teil-) autonomer und
zumindest teilweise elektrisch betriebener Fahrzeuge fordert von der Automobilindustrie …
zumindest teilweise elektrisch betriebener Fahrzeuge fordert von der Automobilindustrie …
An efficient broadcast authentication scheme in wireless sensor networks
SM Chang, S Shieh, WW Lin, CM Hsieh - Proceedings of the 2006 ACM …, 2006 - dl.acm.org
A broadcast authentication mechanism is important in wireless sensor networks, assuring
receivers of a packet's validity. To provide authentication, some researchers utilize one way …
receivers of a packet's validity. To provide authentication, some researchers utilize one way …
A suggested testbed to evaluate multicast network and threat prevention performance of Next Generation Firewalls
Although security have to be a key issue for systems carrying intelligence such as
surveillance system, it is still overshadowed by bandwidth utilization in multicast networks …
surveillance system, it is still overshadowed by bandwidth utilization in multicast networks …