[1]
B. J. Wysocki, Y. Wang, and R. Safavi-Naini, “On a method to authenticate and verify digital streams”, JTIT, vol. 8, no. 2, pp. 45–52, Jun. 2002, doi: 10.26636/jtit.2002.2.123.