Sciweavers

179 search results - page 13 / 36
» Secure Multicast in WiMAX
Sort
View
TCC
2007
Springer
124views Cryptology» more  TCC 2007»
15 years 8 months ago
Tackling Adaptive Corruptions in Multicast Encryption Protocols
We prove a computational soundness theorem for symmetric-key encryption protocols that can be used to analyze security against adaptively corrupting adversaries (that is, adversar...
Saurabh Panjwani
IC
2009
14 years 11 months ago
Efficient Distributed Search for Multicast Session Keywords
mDNS is a proposed DNS-aware, hierarchical, and scalable multicast session directory architecture that enables multicast session registration and makes them discoverable in real ti...
Piyush Harsh, Richard Newman
SASN
2003
ACM
15 years 7 months ago
Secure multicast groups on ad hoc networks
In this paper we address the problem of secure multicast of data streams over a multihop wireless ad hoc network. We propose a dynamic multicast group management protocol that aim...
Tansel Kaya, Guolong Lin, Guevara Noubir, A. Yilma...
145
Voted
AWCC
2004
Springer
15 years 7 months ago
Securing Multicast Groups in Ad Hoc Networks
Group communication in multicast environment has been a growing importance in ad hoc networks, and providing secure communication in the group is essential in many ad hoc applicat...
Hartono Kurnio, Huaxiong Wang, Josef Pieprzyk, Kri...