A source authentication scheme using network coding.
Ahmed Osama Fathy AtyaTamer A. ElBattMoustafa YoussefPublished in: Int. J. Secur. Networks (2011)
Keyphrases
- authentication scheme
- network coding
- wireless networks
- smart card
- routing algorithm
- user authentication
- secret key
- public key
- network bandwidth
- multiple description coding
- key management
- network layer
- authentication protocol
- network topology
- ad hoc networks
- shortest path
- security analysis
- real time
- image transmission
- routing protocol