Sciweavers

318 search results - page 18 / 64
» A New Family of Authentication Protocols
Sort
View
IWDC
2001
Springer
129views Communications» more  IWDC 2001»
14 years 2 days ago
Towards a New Generation of Generic Transport Protocols
Considering that current end to end communication services are not adapted for supporting efficiently distributed multimedia application, this paper introduces a new family of gene...
Patrick Sénac, Ernesto Exposito, Michel Dia...
CEAS
2008
Springer
13 years 9 months ago
Improving Email Trustworthiness through Social-Group Key Authentication
The increasing use of email for phishing and unsolicited marketing has reduced the trustworthiness of email as a communication medium. Sender authentication is a known defense aga...
Vivek Pathak, Liviu Iftode, Danfeng Yao
LCN
2006
IEEE
14 years 1 months ago
The Internet Group Management Protocol with Access Control (IGMP-AC)
IP Multicast is best known for its bandwidth conservation and lower resource utilization. The classical model of multicast makes it difficult to permit access only to authorized ...
Salekul Islam, J. William Atwood
IJISEC
2008
92views more  IJISEC 2008»
13 years 7 months ago
A coding approach to the multicast stream authentication problem
We study the multicast stream authentication problem when an opponent can drop, reorder and introduce data packets into the communication channel. In such a model, packet overhead...
Christophe Tartary, Huaxiong Wang, Josef Pieprzyk
SP
2010
IEEE
156views Security Privacy» more  SP 2010»
13 years 5 months ago
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes
Abstract--We consider resource-constrained broadcast authentication for n receivers in a static, known network topology. There are only two known broadcast authentication protocols...
Haowen Chan, Adrian Perrig