2004
DOI: 10.1109/comst.2004.5342292
|View full text |Cite
|
Sign up to set email alerts
|

A taxonomy of multicast data origin authentication: Issues and solutions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
49
0

Year Published

2005
2005
2016
2016

Publication Types

Select...
6
3

Relationship

2
7

Authors

Journals

citations
Cited by 64 publications
(49 citation statements)
references
References 41 publications
0
49
0
Order By: Relevance
“…This is why, [5] argue that the efficiency of data origin authentication mechanisms rely on the key management mechanism in use.…”
Section: B Preventing Router Impersonationmentioning
confidence: 99%
“…This is why, [5] argue that the efficiency of data origin authentication mechanisms rely on the key management mechanism in use.…”
Section: B Preventing Router Impersonationmentioning
confidence: 99%
“…Several schemes have been proposed 978-1-4244-4652-0/09/$25.00 c 2009 IEEE to address this problem in different settings [1]. However, no rigorous analysis and quantitative comparison of the different schemes have been done in the literature, to the best of our knowledge.…”
Section: Introductionmentioning
confidence: 96%
“…In contrast, multicast data origin authentication is more complicated because the group key which is known by all group members cannot be used to identify a specific sender. We distinguish between two levels of multicast data origin authentication [6]:…”
Section: Introductionmentioning
confidence: 99%