Resource Requirement Analysis for a Predictive-Hashing Based Multicast Authentication Protocol.
Seonho ChoiYanggon KimPublished in: EUC Workshops (2006)
Keyphrases
- requirement analysis
- authentication protocol
- hash functions
- data warehouse
- smart card
- public key
- model construction
- lightweight
- security analysis
- security protocols
- secret key
- rfid tags
- similarity search
- data structure
- end to end
- database
- wireless networks
- resource constraints
- routing algorithm
- decision making
- data mining
- data sets