Progress of the research on IP multicast data origin authentication with non-repudiation

Data origin authentication is an important part in the multicast security architecture. Data origin authentication can be classified as repudiation and non-repudiation. In this paper, several typical data origin authentication protocols with non-repudiation are summarized according to the taxonomy o...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Dian zi yu xin xi xue bao = Journal of electronics & information technology 2006-11, Vol.28 (11), p.2205-2208
Hauptverfasser: Zhang, Hai-Bo, Zhou, Xian-Wei, Song, Cun-Yi
Format: Artikel
Sprache:chi
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 2208
container_issue 11
container_start_page 2205
container_title Dian zi yu xin xi xue bao = Journal of electronics & information technology
container_volume 28
creator Zhang, Hai-Bo
Zhou, Xian-Wei
Song, Cun-Yi
description Data origin authentication is an important part in the multicast security architecture. Data origin authentication can be classified as repudiation and non-repudiation. In this paper, several typical data origin authentication protocols with non-repudiation are summarized according to the taxonomy of data origin authentication with non-repudiation. The advantages and shortcomings of these protocols are discussed respectively, also the problems existed are anatomized in depth. This paper is a sum-up of the protocols of data origin authentication protocols with non-repudiation at the present time. The future trend and the remaining problems of data origin authentication with non-repudiation are also discussed.
format Article
fullrecord <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_miscellaneous_29558928</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>29558928</sourcerecordid><originalsourceid>FETCH-LOGICAL-p101t-fdf097a90f69aba108358f5863e7b3d99f0a92e0155784ffa06e288c3fa88e513</originalsourceid><addsrcrecordid>eNotj8tqwzAURLVIoSHNP2jVneHKqmRpGUIfgUCzaKG7cG1fxQJHciWZ_n7dx2qGmcPArNhaANhKGatv2TZn30IthW4A5Jp9nFK8JMqZR8fLQHzxhKkbeAz8cOLXeSy-w1x4jwV5TP7iA8d5QcNPUfzCffky8BBDlWiae_8b3rEbh2Om7b9u2PvT49v-pTq-Ph_2u2M1CRClcr0D26AFpy22KMBIZZwyWlLTyt5aB2hrAqFUYx6cQ9BUG9NJh8aQEnLD7v92pxQ_Z8rlfPW5o3HEQHHO59qq5Xlt5Dc9r1AQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>29558928</pqid></control><display><type>article</type><title>Progress of the research on IP multicast data origin authentication with non-repudiation</title><source>Alma/SFX Local Collection</source><creator>Zhang, Hai-Bo ; Zhou, Xian-Wei ; Song, Cun-Yi</creator><creatorcontrib>Zhang, Hai-Bo ; Zhou, Xian-Wei ; Song, Cun-Yi</creatorcontrib><description>Data origin authentication is an important part in the multicast security architecture. Data origin authentication can be classified as repudiation and non-repudiation. In this paper, several typical data origin authentication protocols with non-repudiation are summarized according to the taxonomy of data origin authentication with non-repudiation. The advantages and shortcomings of these protocols are discussed respectively, also the problems existed are anatomized in depth. This paper is a sum-up of the protocols of data origin authentication protocols with non-repudiation at the present time. The future trend and the remaining problems of data origin authentication with non-repudiation are also discussed.</description><identifier>ISSN: 1009-5896</identifier><language>chi</language><ispartof>Dian zi yu xin xi xue bao = Journal of electronics &amp; information technology, 2006-11, Vol.28 (11), p.2205-2208</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780</link.rule.ids></links><search><creatorcontrib>Zhang, Hai-Bo</creatorcontrib><creatorcontrib>Zhou, Xian-Wei</creatorcontrib><creatorcontrib>Song, Cun-Yi</creatorcontrib><title>Progress of the research on IP multicast data origin authentication with non-repudiation</title><title>Dian zi yu xin xi xue bao = Journal of electronics &amp; information technology</title><description>Data origin authentication is an important part in the multicast security architecture. Data origin authentication can be classified as repudiation and non-repudiation. In this paper, several typical data origin authentication protocols with non-repudiation are summarized according to the taxonomy of data origin authentication with non-repudiation. The advantages and shortcomings of these protocols are discussed respectively, also the problems existed are anatomized in depth. This paper is a sum-up of the protocols of data origin authentication protocols with non-repudiation at the present time. The future trend and the remaining problems of data origin authentication with non-repudiation are also discussed.</description><issn>1009-5896</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2006</creationdate><recordtype>article</recordtype><recordid>eNotj8tqwzAURLVIoSHNP2jVneHKqmRpGUIfgUCzaKG7cG1fxQJHciWZ_n7dx2qGmcPArNhaANhKGatv2TZn30IthW4A5Jp9nFK8JMqZR8fLQHzxhKkbeAz8cOLXeSy-w1x4jwV5TP7iA8d5QcNPUfzCffky8BBDlWiae_8b3rEbh2Om7b9u2PvT49v-pTq-Ph_2u2M1CRClcr0D26AFpy22KMBIZZwyWlLTyt5aB2hrAqFUYx6cQ9BUG9NJh8aQEnLD7v92pxQ_Z8rlfPW5o3HEQHHO59qq5Xlt5Dc9r1AQ</recordid><startdate>20061101</startdate><enddate>20061101</enddate><creator>Zhang, Hai-Bo</creator><creator>Zhou, Xian-Wei</creator><creator>Song, Cun-Yi</creator><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20061101</creationdate><title>Progress of the research on IP multicast data origin authentication with non-repudiation</title><author>Zhang, Hai-Bo ; Zhou, Xian-Wei ; Song, Cun-Yi</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p101t-fdf097a90f69aba108358f5863e7b3d99f0a92e0155784ffa06e288c3fa88e513</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>chi</language><creationdate>2006</creationdate><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Zhang, Hai-Bo</creatorcontrib><creatorcontrib>Zhou, Xian-Wei</creatorcontrib><creatorcontrib>Song, Cun-Yi</creatorcontrib><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Dian zi yu xin xi xue bao = Journal of electronics &amp; information technology</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Zhang, Hai-Bo</au><au>Zhou, Xian-Wei</au><au>Song, Cun-Yi</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Progress of the research on IP multicast data origin authentication with non-repudiation</atitle><jtitle>Dian zi yu xin xi xue bao = Journal of electronics &amp; information technology</jtitle><date>2006-11-01</date><risdate>2006</risdate><volume>28</volume><issue>11</issue><spage>2205</spage><epage>2208</epage><pages>2205-2208</pages><issn>1009-5896</issn><abstract>Data origin authentication is an important part in the multicast security architecture. Data origin authentication can be classified as repudiation and non-repudiation. In this paper, several typical data origin authentication protocols with non-repudiation are summarized according to the taxonomy of data origin authentication with non-repudiation. The advantages and shortcomings of these protocols are discussed respectively, also the problems existed are anatomized in depth. This paper is a sum-up of the protocols of data origin authentication protocols with non-repudiation at the present time. The future trend and the remaining problems of data origin authentication with non-repudiation are also discussed.</abstract><tpages>4</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1009-5896
ispartof Dian zi yu xin xi xue bao = Journal of electronics & information technology, 2006-11, Vol.28 (11), p.2205-2208
issn 1009-5896
language chi
recordid cdi_proquest_miscellaneous_29558928
source Alma/SFX Local Collection
title Progress of the research on IP multicast data origin authentication with non-repudiation
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-01T00%3A51%3A44IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Progress%20of%20the%20research%20on%20IP%20multicast%20data%20origin%20authentication%20with%20non-repudiation&rft.jtitle=Dian%20zi%20yu%20xin%20xi%20xue%20bao%20=%20Journal%20of%20electronics%20&%20information%20technology&rft.au=Zhang,%20Hai-Bo&rft.date=2006-11-01&rft.volume=28&rft.issue=11&rft.spage=2205&rft.epage=2208&rft.pages=2205-2208&rft.issn=1009-5896&rft_id=info:doi/&rft_dat=%3Cproquest%3E29558928%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=29558928&rft_id=info:pmid/&rfr_iscdi=true