Authenticating Multicast Streams in Lossy Channels Using Threshold Techniques
Al-Ibrahim, Mohamed & Pieprzyk, Josef (2001) Authenticating Multicast Streams in Lossy Channels Using Threshold Techniques. In Networking — ICN 2001. Springer Berlin Heidelberg, pp. 239-249.
We first classify the state-of-the-art stream authentication problem in the multicast environment and group them into Signing and MAC approaches. A new approach for authenticating digital streams using Threshold Techniques is introduced. The new approach main advantages are in tolerating packet loss, up to a threshold number, and having a minimum space overhead. It is most suitable for multicast applications running over lossy, unreliable communication channels while, in same time, are pertain the security requirements. We use linear equations based on Lagrange polynomial interpolation and Combinatorial Design methods.
Impact and interest:
Citation counts are sourced monthly from and citation databases.
These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards.
Citations counts from theindexing service can be viewed at the linked Google Scholar™ search.
|Item Type:||Book Chapter|
|Additional Information:||First International Conference on Networking Colmar, France, July 9–13, 2001 Proceedings, Part II|
|Divisions:||Current > Schools > School of Electrical Engineering & Computer Science
Current > QUT Faculties and Divisions > Science & Engineering Faculty
|Deposited On:||02 Jul 2014 05:33|
|Last Modified:||27 Oct 2015 16:05|
Repository Staff Only: item control page