On-the-fly verification of rateless erasure codes for efficient content distribution

MN Krohn, MJ Freedman… - IEEE Symposium on …, 2004 - ieeexplore.ieee.org
The quality of peer-to-peer content distribution can suffer when malicious participants
intentionally corrupt content. Some systems using simple block-by-block downloading can …

Multicast authentication in the smart grid with one-time signature

Q Li, G Cao - IEEE Transactions on Smart Grid, 2011 - ieeexplore.ieee.org
Multicast has been envisioned to be useful in many smart grid applications such as demand-
response, wide area protection, in-substation protection and various operation and control …

Mitigating DoS attacks against broadcast authentication in wireless sensor networks

P Ning, A Liu, W Du - ACM Transactions on Sensor Networks (TOSN), 2008 - dl.acm.org
Broadcast authentication is a critical security service in wireless sensor networks. There are
two general approaches for broadcast authentication in wireless sensor networks: digital …

Flooding-resilient broadcast authentication for vanets

HC Hsiao, A Studer, C Chen, A Perrig, F Bai… - Proceedings of the 17th …, 2011 - dl.acm.org
Digital signatures are one of the fundamental security primitives in Vehicular Ad-Hoc
Networks (VANETs) because they provide authenticity and non-repudiation in broadcast …

Chaining watermarks for detecting malicious modifications to streaming data

H Guo, Y Li, S Jajodia - Information Sciences, 2007 - Elsevier
Authenticating streaming data is a very important research area due to its wide range of
applications. Previous technologies mainly focused on authenticating data packets at the IP …

Time valid one-time signature for time-critical multicast data authentication

Q Wang, H Khurana, Y Huang… - IEEE INFOCOM …, 2009 - ieeexplore.ieee.org
It is challenging to provide authentication to time-critical multicast data, where low end-to-
end delay is of crucial importance. Consequently, it requires not only efficient authentication …

Efficient local secret sharing for distributed blockchain systems

Y Kim, RK Raman, YS Kim, LR Varshney… - IEEE …, 2018 - ieeexplore.ieee.org
Blockchain systems store transaction data in the form of a distributed ledger where each
peer is to maintain an identical copy. Blockchain systems resemble repetition codes …

An efficient broadcast authentication scheme in wireless sensor networks

SM Chang, S Shieh, WW Lin, CM Hsieh - Proceedings of the 2006 ACM …, 2006 - dl.acm.org
A broadcast authentication mechanism is important in wireless sensor networks, assuring
receivers of a packet's validity. To provide authentication, some researchers utilize one way …

A suggested testbed to evaluate multicast network and threat prevention performance of Next Generation Firewalls

G Uçtu, M Alkan, İA Doğru, M Dörterler - Future Generation Computer …, 2021 - Elsevier
Although security have to be a key issue for systems carrying intelligence such as
surveillance system, it is still overshadowed by bandwidth utilization in multicast networks …

PKC based broadcast authentication using signature amortization for WSNs

Y Liu, J Li, M Guizani - IEEE Transactions on Wireless …, 2012 - ieeexplore.ieee.org
Public Key Cryptography (PKC) is widely used for broadcast authentication. Intensive use of
PKC for broadcast authentication, however, is thought to be expensive to resource …