Back to Results
First PageMeta Content
Computing / Coding theory / Error detection and correction / IP multicast / Secure multicast / Transmission Control Protocol / Password authentication protocol / Reed–Solomon error correction / Communications protocol / Information / Data / Internet protocols


Multicast Authentication in Fully Adversarial Networks Anna Lysyanskaya Roberto Tamassia Nikos Triandopoulos Brown University Department of Computer Science
Add to Reading List

Document Date: 2009-01-20 23:46:12


Open Document

File Size: 214,52 KB

Share Result on Facebook

Company

Oracle / /

Country

Sudan / /

/

IndustryTerm

generation algorithm / network-layer transmission protocol / polynomial-time algorithms / authenticator algorithm / secure and trusted routers / verification algorithm / probabilistic algorithms / probabilistic polynomial-time algorithm / adversarial network / honest routers / verification algorithms / trivial solution / decoder algorithm / transport protocol / signature algorithm / /

Organization

Brown University Department of Computer Science Providence / /

Person

Anna Lysyanskaya Roberto Tamassia Nikos / Ai / /

Position

MP / rt / /

ProgrammingLanguage

C / /

Technology

cryptography / UDP transport protocol / probabilistic algorithms / key generation algorithm / public key / network-layer transmission protocol / authenticator algorithm / verification algorithms / signing algorithm / honest routers / verification algorithm / signature algorithm / decoder algorithm / Probabilistic polynomial-time algorithms / secret key / probabilistic polynomial-time algorithm / digital signature / secure and trusted routers / two algorithms / /

SocialTag