Secrecy & Rate Adaptation for secure HARQ protocols.
Maël Le TreustLeszek SzczecinskiFabrice LabeauPublished in: ITW (2013)
Keyphrases
- key distribution
- rate adaptation
- key management
- security properties
- end to end
- wireless networks
- authentication protocol
- mutual authentication
- security protocols
- cross layer
- security analysis
- cryptographic protocols
- video streaming
- fine granularity
- secret key
- wireless ad hoc networks
- ad hoc networks
- scalable video coding
- signature scheme
- security requirements
- diffie hellman
- application layer
- video streams
- resource constrained
- smart card
- perceived quality
- computational complexity
- rfid tags
- video sequences