Sciweavers

554 search results - page 1 / 111
» A New Approach For Source Authentication Of Multicast Data
Sort
View
CSREASAM
2006
13 years 5 months ago
A New Approach For Source Authentication Of Multicast Data
Multicast Security is one of the important problems to solve for the successful deployment of group communication applications, and source authentication of multicast data is a key...
Jinxin He, Gaochao Xu, Zhiguo Zhou, Guannan Gong
EUROMICRO
2007
IEEE
13 years 10 months ago
A Light-Weight Implementation Scheme of the Tree Morphing Protocol for Mobile Multicast Sources
Multicast network services advantageously complement multimedia information and communication technologies, as they open up the realm for highly scalable multicustomer application...
Olaf Christ, Thomas C. Schmidt, Matthias Wähl...
IJNSEC
2011
167views more  IJNSEC 2011»
12 years 11 months ago
New Real Time Multicast Authentication Protocol
Multicast gives professional large-scale content distribution by providing an efficient transport mechanism for one-to-many and many-to-many communications. There is a number of s...
Riham Abdellatif, Heba Kamal Aslan, Salwa H. Elram...
WWIC
2004
Springer
124views Communications» more  WWIC 2004»
13 years 9 months ago
Mobility-Aware Rendezvous Point for Mobile Multicast Sources
: Current multicast routing protocols have not been designed for mobile nodes and especially roaming sources. Using the remote subscription as basis, we develop a new approach base...
Imed Romdhani, Mounir Kellil, Hong-Yon Lach, Abdel...
IJISEC
2008
92views more  IJISEC 2008»
13 years 4 months ago
A coding approach to the multicast stream authentication problem
We study the multicast stream authentication problem when an opponent can drop, reorder and introduce data packets into the communication channel. In such a model, packet overhead...
Christophe Tartary, Huaxiong Wang, Josef Pieprzyk