Author image not provided
 Alain Pannetrat

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article5.43
Citation Count38
Publication count7
Publication years1999-2002
Available for download2
Average downloads per article883.50
Downloads (cumulative)1,767
Downloads (12 Months)13
Downloads (6 Weeks)1
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


7 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 7 of 7
Sort by:

1
September 2002 Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security
Publisher: Kluwer, B.V.
Bibliometrics:
Citation Count: 1


2
July 2002 ISCC '02: Proceedings of the Seventh International Symposium on Computers and Communications (ISCC'02)
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 10

In this work we propose a new stream authentication scheme that is suitable for live packet streams distributed over a lossy channel, such as an IP-multicast group. Packets are signed together in a block and the recipient can authenticate this block if the loss rate per block is lower than ...

3
May 2002 Advanced Lectures on Networking, NETWORKING 2002 [This book presents the revised version of seven tutorials given at the NETWORKING 2002 Conference in Pisa, Italy in May 2002]
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0

This chapter is an overview of security requirements raised by multicast communications along with a survey of principal solutions. A detailed requirement analysis points out the characteristics of multicast in terms of security and scalability. The differences between unicast and multicast communications with respect to the design of authentication and ...

4
January 2002 Advanced lectures on networking
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 0

This chapter is an overview of security requirements raised by multicast communications along with a survey of principal solutions. A detailed requirement analysis points out the characteristics of multicast in terms of security and scalability. The differences between unicast and multicast communications with respect to the design of authentication and ...

5
February 2001 Electronic Commerce Research - Special issue on agents in electronic commerce: Volume 1 Issue 1-2, February/March 2001
Publisher: Kluwer Academic Publishers
Bibliometrics:
Citation Count: 3

This paper describes a protocol to protect data collected by mobile agents roaming through a set of potentially malicious hosts. This protocol is based on an original secure cryptographic technique that assures the integrity of a sequence of data segments regardless of the order of each segment in the sequence. ...
Keywords: data collection, electronic commerce, mobile agents, security

6 published by ACM
August 2000 ACM Transactions on Information and System Security (TISSEC): Volume 3 Issue 3, Aug. 2000
Publisher: ACM
Bibliometrics:
Citation Count: 10
Downloads (6 Weeks): 1,   Downloads (12 Months): 9,   Downloads (Overall): 1,150

Full text available: PDFPDF
In this article we propose a new framework for multicast security based on distributed computation of security transforms by intermediate nodes. The involvement of intermediate nodes in the security process causes a new type of dependency between group membership and the topology of the multicast network. Thanks to this dependency, ...
Keywords: confidentiality, scalability, Diffie-Hellman, RSA, group communications, key distribution

7 published by ACM
November 1999 CCS '99: Proceedings of the 6th ACM conference on Computer and communications security
Publisher: ACM
Bibliometrics:
Citation Count: 14
Downloads (6 Weeks): 0,   Downloads (12 Months): 4,   Downloads (Overall): 617

Full text available: PdfPdf
In this paper we propose a new framework for multicast security based on distributed computation of security transforms by intermediate nodes. The involvement of intermediate nodes in the security process causes a new type of dependency between group membership and the topology of the multicast network. Thanks to this dependency, ...



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us