Information Technology Reference
In-Depth Information
Table 3. Best known q 2 ( b )forsome v
v
max known
q 2 (
b
) best
q 1 (
b
)forthis
q 2
10
2
3
20
4
6
30
5
9
40
7
12
60
10
16
100
16
26
Acknowledgment
The authors would like to thank Carl Diegert and Roberto Tamassia for helpful
discussions, and Austin McDaniel for implementing iterative search.
References
1. Perrig, A., Canetti, R., Tygar, D., Song, D.: The TESLA broadcast authentication
protocol. Crypto. Bytes 5(2), 2-13 (2002)
2. Perrig, A., Canetti, R., Tygar, J.D., Song, D.X.: Ecient authentication and signing
of multicast streams over lossy channels. In: IEEE Symposium on Security and
Privacy, pp. 56-73 (2000)
3. Luk, M., Perrig, A., Whillock, B.: Seven cardinal properties of sensor network broad-
cast authentication. In: SASN 2006: Proceedings of the fourth ACM workshop on
Security of ad hoc and sensor networks, pp. 147-156. ACM, New York (2006)
4. Bellare, M., Canetti, R., Krawczyk, H.: Message authentication using hash functions:
the HMAC construction. CryptoBytes 2(1), 12-15 (1996)
5. Hall Jr., M.: Combinatorial theory, 2nd edn. John Wiley & Sons, Inc., New York
(1998)
 
Search WWH ::




Custom Search