A hybrid scheme for multicast authentication over lossy networks.
Heba Kamal AslanPublished in: Comput. Secur. (2004)
Keyphrases
- network coding
- blocking probability
- authentication scheme
- wireless networks
- routing algorithm
- key distribution
- security analysis
- wireless ad hoc networks
- authentication protocol
- network structure
- image authentication
- network bandwidth
- network topology
- cellular networks
- user authentication
- mobile networks
- data compression
- key management scheme
- authentication mechanism
- secret image sharing
- key management
- public key
- end to end
- multicast routing
- routing scheme
- rights management