Publication | Closed Access
Signatures for Network Coding
186
Citations
17
References
2006
Year
Unknown Venue
EngineeringDigital SignatureAuthentication ProtocolInformation SecurityVerificationData PrivacyInformation ForensicsLinear Network CodingNetwork CodingMalicious NodesComputer ScienceSecure ProtocolFormal VerificationNetwork ForensicsData SecurityCryptographyNetwork Security
This paper presents a practical digital signature scheme to be used in conjunction with network coding. Our scheme simultaneously provides authentication and detects malicious nodes that intentionally corrupt content on the network.
| Year | Citations | |
|---|---|---|
Page 1
Page 1