Security analysis of Bloom filter based multicast forwarding.
Xiaohua TianJiaqi LiuWei LiuYu ChengLijun OuZilong ZhaoPublished in: ACM TUR-C (2017)
Keyphrases
- security analysis
- overlay network
- network layer
- ip multicast
- peer to peer
- public key
- smart card
- security requirements
- security properties
- wireless networks
- routing algorithm
- encryption scheme
- application layer
- high security
- network coding
- image encryption
- user authentication
- authentication protocol
- routing protocol
- mutual authentication
- ad hoc networks
- authentication scheme
- databases