Login / Signup
A tree-based scheme for security of many-to-many communications.
Ren-Hung Lin
Jinn-ke Jan
Published in:
J. High Speed Networks (2007)
Keyphrases
</>
authentication protocol
security analysis
authentication scheme
mutual authentication
network management
intrusion detection
communication networks
sensor networks
access control
security requirements
high security
electronic voting
authentication mechanism