Sciweavers

554 search results - page 2 / 111
» A New Approach For Source Authentication Of Multicast Data
Sort
View
CIIT
2004
268views Communications» more  CIIT 2004»
13 years 6 months ago
SSM-ping: A ping utility for source specific multicast
Management has become a key concern for the success of multicast deployment in the Internet. One of the most important management tasks for multicast is to verify the availability...
Pavan Namburi, Kamil Saraç, Kevin C. Almero...
GLOBECOM
2006
IEEE
13 years 11 months ago
Any Source Implicit Multicast (ASIMcast)
Abstract— This paper proposes the ASIMcast (Any-Source Implicit Multicast) protocol which builds a bidirectional tree for routing of multicast traffic. ASIMcast includes feature...
Laurent Nadeau, Tricha Anjali
AINTEC
2006
Springer
13 years 8 months ago
A Topology-Aware Overlay Multicast Approach for Mobile Ad-Hoc Networks
AOMP (Ad-hoc Overlay Multicast Protocol) is a novel approach for application-layer multicast in ad-hoc networks. We introduce in this paper a new algorithm that exploits a few prop...
Mohamed Ali Kâafar, Cyrine Mrabet, Thierry T...
INFOCOM
1999
IEEE
13 years 9 months ago
Multicast Security: A Taxonomy and Some Efficient Constructions
Multicast communication is becoming the basis for a growing number of applications. It is therefore critical to provide sound security mechanisms for multicast communication. Yet, ...
Ran Canetti, Juan A. Garay, Gene Itkis, Daniele Mi...
CN
2007
116views more  CN 2007»
13 years 4 months ago
Scalability and security in biased many-to-one communication
In multicast communication, a source transmits the same content to a set of receivers. Current protocols for multicast follow a tree communication model which makes them scalable....
Francesc Sebé, Josep Domingo-Ferrer