Password authentication with insecure communication, Communications of the ACM, vol.24, issue.11, pp.770-772, 1981. ,
DOI : 10.1145/358790.358797
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.64.3756
Sushil Jajodia Chaining watermarks for detecting malicious modifications to streaming data'; Information Sciences 177, pp.281-298, 2007. ,
DOI : 10.1016/j.ins.2006.03.014
Efficient Constructions for One-Way Hash Chains, ANCS'05, 2005. ,
DOI : 10.1007/11496137_29
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.6.326
The MD5 message-digest algorithm, 1992. ,
DOI : 10.17487/rfc1321
A hybrid scheme for multicast authentication over lossy networks'; Computers & Security 23, pp.705-713, 2004. ,
SPINS, Proceedings of the 7th annual international conference on Mobile computing and networking , MobiCom '01, 2001. ,
DOI : 10.1145/381677.381696
Song Han; 'A Survey of RFID Authentication Protocols Based on Hash-Chain Method, Third International Conference on Convergence and Hybrid Information Technology ICCIT 08, pp.11-13559, 2008. ,
Sushil Jajodia; 'Chaining watermarks for detecting malicious modifications to streaming data'; Information Sciences, pp.281-298, 2007. ,
DOI : 10.1016/j.ins.2006.03.014
A Study of Micropayment Based on One-Way Hash Chain', International Journal of Network Security, vol.2, issue.2, pp.81-90, 2006. ,
Using an efficient hash chain and delaying function to improve an e-lottery scheme, International Journal of Computer Mathematics, vol.84, issue.7, pp.967-970, 2007. ,
DOI : 10.1007/BFb0055485
RLH: receiver driven layered hash-chaining for multicast data origin authentication'; Computer Communications 28, pp.726-740, 2005. ,
How to sign digital streams, Proceedings of the Advances in Cryptology CRYPTO'97, pp.180-197, 1997. ,
Stream authentication based on generalized butterfly graph, Proceedings of the IEEE International Conference on Image Processing (ICIP'07), pp.121-124, 2007. ,
Efficient authentication and signing of multicast streams over lossy channels, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, pp.56-73, 2000. ,
DOI : 10.1109/SECPRI.2000.848446
Authentication streamed data in the presence of random packet loss, ISOC Network and Distributed System Security Symposium, pp.13-22, 2001. ,
Afifi Hossam Optimization of File Allocation for Video Sharing Servers, NTMS 3 rd IEEE International Conference, pp.1-5, 2009. ,
RTP Payload Format for MPEG-4 Audio/Visual Streams, 2000. ,
DOI : 10.17487/rfc3016
A Framework for Transmission of IP Datagrams over MPEG-2 Networks ' ; RFC 4259, 2005. ,
Electronic Signature Formats, 2001. ,
Diffie-Hellman Key Agreement Method', RFC 2631, 1999. ,