Cryptanalysis of scalable multicast security protocol.
Ronggong SongLarry KorbaPublished in: IEEE Commun. Lett. (2003)
Keyphrases
- security protocols
- block cipher
- artificial immune algorithm
- automated design
- security services
- key management
- authentication protocol
- security mechanisms
- cryptographic algorithms
- secret key
- routing algorithm
- wireless networks
- application layer
- ad hoc networks
- lightweight
- overlay network
- wireless mesh networks
- data streams