咨询与建议

限定检索结果

文献类型

  • 6 篇 期刊文献
  • 5 篇 会议

馆藏范围

  • 11 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11 篇 工学
    • 7 篇 信息与通信工程
    • 6 篇 电气工程
    • 4 篇 计算机科学与技术...
    • 1 篇 电子科学与技术(可...
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 11 篇 homomorphic mess...
  • 9 篇 network coding
  • 5 篇 pollution attack
  • 3 篇 data pollution a...
  • 3 篇 tag pollution at...
  • 2 篇 pollution attack...
  • 2 篇 security
  • 2 篇 discrete logarit...
  • 1 篇 security proof
  • 1 篇 stream computing...
  • 1 篇 trace function
  • 1 篇 authentication
  • 1 篇 pseudo-random fu...
  • 1 篇 data integrity v...
  • 1 篇 random linear ne...
  • 1 篇 p2p living strea...

机构

  • 3 篇 hubei univ techn...
  • 2 篇 huazhong univ sc...
  • 2 篇 nanyang technol ...
  • 2 篇 school of comput...
  • 2 篇 xidian univ stat...
  • 1 篇 instituto de tel...
  • 1 篇 beijin
  • 1 篇 it aveiro
  • 1 篇 huazhong univ sc...
  • 1 篇 it campus univ s...
  • 1 篇 china acad elect...
  • 1 篇 hong kong univ s...
  • 1 篇 beijing key labo...
  • 1 篇 iquadrat barcelo...

作者

  • 3 篇 jiang tao
  • 3 篇 cheng chi
  • 2 篇 cai ying
  • 2 篇 fan yanfang
  • 2 篇 li zhuo
  • 2 篇 li chen
  • 2 篇 lu rongxing
  • 2 篇 mantas georgios
  • 2 篇 zhang yujie
  • 2 篇 chen le
  • 2 篇 li hui
  • 2 篇 esfahani alireza
  • 2 篇 rodriguez jonath...
  • 1 篇 monteiro valdema...
  • 1 篇 neves jose carlo...
  • 1 篇 jose carlos neve...
  • 1 篇 alberto nascimen...
  • 1 篇 zhang qian
  • 1 篇 ramantas kostas
  • 1 篇 nascimento alber...

语言

  • 11 篇 英文
检索条件"主题词=homomorphic message authentication code"
11 条 记 录,以下是1-10 订阅
排序:
An External Data Integrity Tracking and Verification System for Universal Stream Computing System Framework  21
An External Data Integrity Tracking and Verification System ...
收藏 引用
21st International Conference on Advanced Communication Technology (ICACT)
作者: Wang Hongyuan China Acad Elect & Informat Technol LoongCloud Common Prod Res Inst Beijing Peoples R China
With the development of the cloud computing and big data, massive data based computing and storage have emerged as core technologies. Moreover, a key problem to ensure data availability and analysis accuracy is the da... 详细信息
来源: 评论
Comment on "An Efficient homomorphic MAC with Small Key Size for authentication in Network Coding"
收藏 引用
IEEE TRANSACTIONS ON COMPUTERS 2015年 第3期64卷 882-883页
作者: Li, Chen Chen, Le Lu, Rongxing Li, Hui Xidian Univ State Key Lab Integrated Serv Network Xian 710071 Shaanxi Peoples R China Nanyang Technol Univ Sch Elect & Elect Engn Singapore 639798 Singapore
Quite recently, Cheng and Jiang [1] designed an efficient homomorphic message authentication code (MAC) scheme for authentication in network coding, and claimed that the newly proposed scheme can achieve much higher s... 详细信息
来源: 评论
Analysis of a homomorphic MAC-based Scheme against Tag Pollution in RLNC-Enabled Wireless Networks  20
Analysis of a Homomorphic MAC-based Scheme against Tag Pollu...
收藏 引用
IEEE 20th International Workshop on Computer Aided Modelling and Design of Communication Links and Networks (CAMAD)
作者: Esfahani, Alireza Mantas, Georgios Monteiro, Valdemar Ramantas, Kostas Datsika, Eftychia Rodriguez, Jonathan IT Campus Univ Santiago P-3810193 Aveiro Portugal IQUADRAT Barcelona 08009 Spain
Network Coding-enabled wireless networks are vulnerable to data pollution attacks where adversary nodes inject into the network polluted (i.e. corrupted) packets that prevent the destination nodes from decoding correc... 详细信息
来源: 评论
A Null Space-based MAC Scheme against Pollution Attacks to Random Linear Network Coding
A Null Space-based MAC Scheme against Pollution Attacks to R...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Esfahani, Alireza Mantas, Georgios Rodriguez, Jonathan Nascimento, Alberto Neves, Jose Carlos IT Aveiro Portugal
Network Coding has significantly shown the achievable throughput and robustness in wireless Networks. However, network coding-enabled networks are susceptible to pollution attacks where a small number of polluted mess... 详细信息
来源: 评论
A Null Space-based MAC Scheme against Pollution Attacks to Random Linear Network Coding
A Null Space-based MAC Scheme against Pollution Attacks to R...
收藏 引用
International Conference on Communication Workshop
作者: Alireza Esfahani Georgios Mantas Jonathan Rodriguez Alberto Nascimento Jose Carlos Neves Instituto de Telecomunicações (IT) Aveiro Portugal
Network Coding has significantly shown the achievable throughput and robustness in wireless Networks. However, network coding-enabled networks are susceptible to pollution attacks where a small number of polluted mess... 详细信息
来源: 评论
Comment on "A Novel homomorphic MAC Scheme for authentication in Network Coding"
收藏 引用
IEEE COMMUNICATIONS LETTERS 2014年 第12期18卷 2129-2132页
作者: Li, Chen Lu, Rongxing Li, Hui Chen, Le Li, Xiaoqing Xidian Univ State Key Lab Integrated Serv Network Xian 710071 Peoples R China Nanyang Technol Univ Sch Elect & Elect Engn Singapore 639798 Singapore Nanyang Technol Univ Sch Elect & Elect Engn Singapore 639798 Singapore Xidian Univ State Key Lab Integrated Serv Network Xian 710071 Peoples R China
Recently, Cheng and Jiang [IEEE Commun. Lett., vol. 15, no. 11, pp. 1228-1230, 2011] proposed a novel homomorphic message authentication code (MAC) scheme, called TraceMac, for authentication in network coding, which ... 详细信息
来源: 评论
TESLA-Based homomorphic MAC for authentication in P2P System for Live Streaming with Network Coding
收藏 引用
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS 2013年 第9期31卷 291-298页
作者: Cheng, Chi Jiang, Tao Zhang, Qian Huazhong Univ Sci & Technol Dept Elect & Informat Engn Wuhan Natl Lab Optoelect Wuhan 430074 Peoples R China Hubei Univ Technol Sch Sci Wuhan 430068 Peoples R China Hong Kong Univ Sci & Technol Dept Comp Sci & Engn Hong Kong Hong Kong Peoples R China
Recently, the peer-to-peer (P2P) live streaming system has benefited from the advent of network coding. However, it was demonstrated that malicious nodes could significantly reduce the network throughput by launching ... 详细信息
来源: 评论
An Efficient homomorphic MAC with Small Key Size for authentication in Network Coding
收藏 引用
IEEE TRANSACTIONS ON COMPUTERS 2013年 第10期62卷 2096-2100页
作者: Cheng, Chi Jiang, Tao Huazhong Univ Sci & Technol Dept Elect & Informat Engn Wuhan Natl Lab Optoelect Wuhan 430074 Peoples R China Hubei Univ Technol Sch Sci Wuhan 430068 Peoples R China
Recently, homomorphic message authentication code (MAC) schemes have been proposed to resist against pollution attacks in network coding. However, existing methods face a common challenge: the generated MAC t belongs ... 详细信息
来源: 评论
homomorphic MAC-Based Scheme against Pollution Attacks in Network Coding
收藏 引用
Wuhan University Journal of Natural Sciences 2013年 第5期18卷 435-442页
作者: ZHANG Yujie CAI Ying LI Zhuo FAN Yanfang School of Computer Beijing Information Science and Technology University Beijing Key Laboratory of Internet Culture and Digital Dissemination Research
Network coding can improve network throughput in large, but it is vulnerable to the data pollution attacks. In this paper, we propose an efficient homomorphic message authentication code (MAC) scheme with discrete l... 详细信息
来源: 评论
homomorphic MAC-Based Scheme against Pollution Attacks in Network Coding
Homomorphic MAC-Based Scheme against Pollution Attacks in Ne...
收藏 引用
第七届中国可信计算与信息安全学术会议
作者: ZHANG Yujie CAI Ying LI Zhuo FAN Yanfang School of Computer Beijing Information Science and Technology UniversityBeijing 100101China School of Computer Beijing Information Science and Technology UniversityBeijing 100101China Beijin
Network coding can improve network throughput in large, but it is vulnerable to the data pollution *** this paper,we propose an efficient homomorphic message authentication code (MAC) scheme with discrete logarithm to... 详细信息
来源: 评论