A source authentication and data confidentiality scheme for multicast networks
Source authentication and data confidentiality are needed in many multicast applications. Most research attempted to solve either the source authentication or the confidentiality of data. This paper proposes a scheme that can treat the two problems together. Our scheme uses the TESLA protocol to ens...
Main Authors: | Benmachiche, Abderrahim, Ali, Salami, Messikh Azeddine, Azeddine |
---|---|
Format: | Article |
Language: | English |
Published: |
IIUM Press
2016
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/53007/ http://irep.iium.edu.my/53007/ http://irep.iium.edu.my/53007/1/53007_A%20source%20authentication%20and%20data%20confidentiality%20scheme.pdf |
Similar Items
-
An approach to enhance aggregated source specific multicast scheme
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2008) -
Introduction to mathematical statistics
by: Messikh Azeddine, Azeddine
Published: (2016) -
Rotation gates with controlled adiabatic evolutions in open systems
by: Benmachiche, Abderrahim, et al.
Published: (2018) -
A review of gelatin source authentication methods
by: Hammed, Ademola Monsur, et al.
Published: (2018) -
Quantum rotation gates with controlled nonadiabatic evolutions
by: Abdelrahim, Abdelrahman A H, et al.
Published: (2018)