Sciweavers

109 search results - page 2 / 22
» A coding approach to the multicast stream authentication pro...
Sort
View
IJNSEC
2011
167views more  IJNSEC 2011»
13 years 1 months ago
New Real Time Multicast Authentication Protocol
Multicast gives professional large-scale content distribution by providing an efficient transport mechanism for one-to-many and many-to-many communications. There is a number of s...
Riham Abdellatif, Heba Kamal Aslan, Salwa H. Elram...
CSREASAM
2006
13 years 7 months ago
A New Approach For Source Authentication Of Multicast Data
Multicast Security is one of the important problems to solve for the successful deployment of group communication applications, and source authentication of multicast data is a key...
Jinxin He, Gaochao Xu, Zhiguo Zhou, Guannan Gong
ICAS
2005
IEEE
88views Robotics» more  ICAS 2005»
13 years 11 months ago
A New Approach for the Construction of ALM Trees using Layered Coding
— This paper presents a novel approach for efficient tree construction in ALM (Application Layer Multicast) using layered video coding. This system is suitable for the users in h...
Yohei Okada, Masato Oguro, Jiro Katto, Sakae Okubo
INFOCOM
2005
IEEE
13 years 11 months ago
Achieving minimum-cost multicast: a decentralized approach based on network coding
— We present decentralized algorithms that compute minimum-cost subgraphs for establishing multicast connections in networks that use coding. These algorithms, coupled with exist...
Desmond S. Lun, Niranjan Ratnakar, Ralf Koetter, M...
TCC
2010
Springer
188views Cryptology» more  TCC 2010»
13 years 11 months ago
Delayed-Key Message Authentication for Streams
We consider message authentication codes for streams where the key becomes known only at the end of the stream. This usually happens in key-exchange protocols like SSL and TLS wher...
Marc Fischlin, Anja Lehmann