1988
DOI: 10.1109/5.4445
|View full text |Cite
|
Sign up to set email alerts
|

A survey of information authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
66
0
3

Year Published

1995
1995
2012
2012

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 155 publications
(69 citation statements)
references
References 7 publications
0
66
0
3
Order By: Relevance
“…Our bound for the TW model is much more tight than the previous bound [B]. Our scheme and bound are closely related to unconditionally secure authentication codes [12]- [16]. Especially, our bound on IKl is derived from a bound for splitting authentication codes shown in [16].…”
mentioning
confidence: 73%
“…Our bound for the TW model is much more tight than the previous bound [B]. Our scheme and bound are closely related to unconditionally secure authentication codes [12]- [16]. Especially, our bound on IKl is derived from a bound for splitting authentication codes shown in [16].…”
mentioning
confidence: 73%
“…These types of protocols are first suggested by Simmons [9] and later used for multicast environments by Desmedt et. al [18].Unconditionally secure protocols guarantee strong authentication but are not practical in the real world due to their unsubstantial resource needs.…”
Section:  Unconditionally Secure Protocolsmentioning
confidence: 99%
“…Now suppose that Alice and Bob agree on a keyed authentication scheme that allows Bob to verify that the messages he receives are from Alice. In order to authenticate, Alice sends a proof of authentication, called a tag, 1 together with each message for Bob's verification. We call the transmitted signal under this scheme as the tagged signal.…”
Section: A Scenariomentioning
confidence: 99%
“…Some examples of multiplexed authentication are message authentication codes or authentication protocols that require a series of messages devoted to authentication. An overview of these methods may be found in [1] and in [2,Ch. 9 and 10].…”
Section: Introductionmentioning
confidence: 99%