A source authentication and data confidentiality scheme for multicast networks
Source authentication and data confidentiality are needed in many multicast applications. Most research attempted to solve either the source authentication or the confidentiality of data. This paper proposes a scheme that can treat the two problems together. Our scheme uses the TESLA protocol to ens...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IIUM Press
2016
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/53007/1/53007_A%20source%20authentication%20and%20data%20confidentiality%20scheme.pdf http://irep.iium.edu.my/53007/ http://journals.iium.edu.my/ijpcc/index.php/IJPCC/article/view/23 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|