Multicast Authentication in Fully Adversarial Networks.
Anna LysyanskayaRoberto TamassiaNikos TriandopoulosPublished in: IEEE Symposium on Security and Privacy (2004)
Keyphrases
- network coding
- wireless ad hoc networks
- wireless networks
- end to end
- multicast routing
- network design
- authentication scheme
- social networks
- data encryption
- heterogeneous networks
- authentication protocol
- application layer
- wireless sensor networks
- multicast tree
- link failure
- multi agent
- neural network
- authentication mechanism
- multicast routing protocol