Sciweavers

554 search results - page 3 / 111
» A New Approach For Source Authentication Of Multicast Data
Sort
View
LCN
2006
IEEE
13 years 11 months ago
The Internet Group Management Protocol with Access Control (IGMP-AC)
IP Multicast is best known for its bandwidth conservation and lower resource utilization. The classical model of multicast makes it difficult to permit access only to authorized ...
Salekul Islam, J. William Atwood
ISCC
2002
IEEE
13 years 10 months ago
A new approach to construct multicast trees in MPLS networks
In this paper1 , we present a new approach to construct multicast trees in MPLS networks. This approach utilizes MPLS LSPs between multicast tree branching node routers in order to...
Ali Boudani, Bernard Cousin
CASES
2010
ACM
13 years 3 months ago
Low cost multicast authentication via validity voting in time-triggered embedded control networks
Wired embedded networks must include multicast authentication to prevent masquerade attacks within the network. However, unique constraints for these networks make most existing m...
Christopher Szilagyi, Philip Koopman
NETWORKING
2004
13 years 6 months ago
Secure Reverse Communication in a Multicast Tree
Abstract. Multicast content delivery can be expected to become a major source of revenue with the increase of private broadband fixed and mobile communications. Several multicast a...
Josep Domingo-Ferrer, Antoni Martínez-Balle...
NGC
2001
Springer
116views Communications» more  NGC 2001»
13 years 9 months ago
Scalable IP Multicast Sender Access Control for Bi-directional Trees
Bi-directional shared tree is an efficient routing scheme for interactive multicast applications with multiple sources. Given the open-group IP multicast service model, it is impor...
Ning Wang, George Pavlou