Login / Signup
A robust multicast authentication scheme based on asymmetric key signature.
Abikoye Oluwakemi Christianah
Boniface Kayode Alese
Aderonke Favour-Bethy Thompson
D. Alowolodu Olufunso
A. Osuolale Festus
Published in:
ICITST (2014)
Keyphrases
</>
authentication scheme
smart card
tampering detection
image encryption
group membership
secret key
digital signature
user authentication
image authentication
real time
query processing
end to end
authentication protocol
private key
routing algorithm