Login / Signup
A new multicast authentication protocol using erasure code functions and signcryption techniques.
Heba Kamal Aslan
Mohamed Rasslan
Published in:
WorldCIS (2013)
Keyphrases
</>
authentication protocol
trusted third party
smart card
security protocols
key management scheme
lightweight
security analysis
source code
security properties
public key
key management
wireless networks
rfid tags
routing algorithm
rfid systems
low cost
secret key
conflict resolution
cost effective