Back to Results
First PageMeta Content
Luby transform code / Erasure code / Forward error correction / Cryptographic hash function / Reed–Solomon error correction / Hash function / Decoder / Digital signature / Systematic code / Coding theory / Error detection and correction / Cryptography


Document Date: 2004-11-17 13:32:22


Open Document

File Size: 206,41 KB

Share Result on Facebook

Facility

K pub / /

IndustryTerm

function applications / multicast authentication protocol / erasure decoding algorithm / hash function applications / tion applications / digital media / hash graph protocols / multicast authentication protocols / recovery algorithms / graph protocols / authentication protocols / last hop router / naive solution / hash applications / /

NaturalFeature

Resistant Authenticated Block Streams Pollution Resistant Authenticated Block Streams / Pollution Resistant Authenticated Block Streams / Resistant Authenticated Block Streams / /

OperatingSystem

DoS / Linux / /

Organization

UC Berkeley / /

Person

Chris Karlof Naveen Sastry Yaping / D ECODE / V / Sastry Yaping Li Adrian Perrig / /

Position

Private / /

Technology

cryptography / multicast authentication protocol / public key / Linux / encoding algorithm / recovery algorithms / last hop router / ECODE algorithm / decoding algorithm / existing multicast authentication protocols / secret key / Multicast authentication protocols / digital signature / constructing DoS-resistant multicast authentication protocols / Hash graph protocols / compromised router / erasure decoding algorithm / /

SocialTag