We study the multicast stream authentication problem when an opponent can drop, reorder and inject data packets into the communication channel. In this context, bandwidth limitation and fast authentication are the core concerns. Therefore any authentication scheme is to reduce as much as possible the packet overhead and the time spent at the receiver to check the authenticity of collected elements. Recently, Tartary and Wang developed a provably secure protocol with small packet overhead and a reduced number of signature verifications to be performed at the receiver. In this paper, we propose an hybrid scheme based on Tartary and Wang’s approach and Merkle hash trees. Our construction will exhibit a smaller overhead and a much faster proces...
Abstract—We consider stored content being streamed to a resource-poor device (such as a sensor node ...
We first classify the state-of-the-art stream authentication problem in the multicast environment an...
We first classify the state-of-the-art stream authentication problem in the multicast environment an...
We study the multicast stream authentication problem when an opponent can drop, reorder and inject d...
Various schemes have been proposed to achieve strong authentication of streamed data in a lossy netw...
We study the multicast stream authentication problem when the communication channel is under control...
We address the multicast stream authentication problem when the communication channel is under the c...
Providing authentication mechanisms for IP-Multicast streams is paramount for the development of lar...
We study the multicast stream authentication problem when an opponent can drop, reorder and introduc...
We describe a novel method for authenticating multicast packets that is robust against packet loss. ...
Several solutions had been introduced to authenticate streamed data delivered in real-time over inse...
We consider the stream authentication problem when an adversary has the ability to drop, reorder or ...
AbstractToday there is a widening in digital technologies and increasing in new multimedia services ...
Multicast stream authentication and signing is an important and challenging problem. Applications in...
Multicast is an efficient communicating scheme in group communications, and data origin authenticati...
Abstract—We consider stored content being streamed to a resource-poor device (such as a sensor node ...
We first classify the state-of-the-art stream authentication problem in the multicast environment an...
We first classify the state-of-the-art stream authentication problem in the multicast environment an...
We study the multicast stream authentication problem when an opponent can drop, reorder and inject d...
Various schemes have been proposed to achieve strong authentication of streamed data in a lossy netw...
We study the multicast stream authentication problem when the communication channel is under control...
We address the multicast stream authentication problem when the communication channel is under the c...
Providing authentication mechanisms for IP-Multicast streams is paramount for the development of lar...
We study the multicast stream authentication problem when an opponent can drop, reorder and introduc...
We describe a novel method for authenticating multicast packets that is robust against packet loss. ...
Several solutions had been introduced to authenticate streamed data delivered in real-time over inse...
We consider the stream authentication problem when an adversary has the ability to drop, reorder or ...
AbstractToday there is a widening in digital technologies and increasing in new multimedia services ...
Multicast stream authentication and signing is an important and challenging problem. Applications in...
Multicast is an efficient communicating scheme in group communications, and data origin authenticati...
Abstract—We consider stored content being streamed to a resource-poor device (such as a sensor node ...
We first classify the state-of-the-art stream authentication problem in the multicast environment an...
We first classify the state-of-the-art stream authentication problem in the multicast environment an...