A source authentication and data confidentiality scheme for multicast networks

Source authentication and data confidentiality are needed in many multicast applications. Most research attempted to solve either the source authentication or the confidentiality of data. This paper proposes a scheme that can treat the two problems together. Our scheme uses the TESLA protocol to ens...

Full description

Saved in:
Bibliographic Details
Main Authors: Benmachiche, Abderrahim, Ali, Salami, Messikh Azeddine, Azeddine
Format: Article
Language:English
Published: IIUM Press 2016
Subjects:
Online Access:http://irep.iium.edu.my/53007/1/53007_A%20source%20authentication%20and%20data%20confidentiality%20scheme.pdf
http://irep.iium.edu.my/53007/
http://journals.iium.edu.my/ijpcc/index.php/IJPCC/article/view/23
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Islam Antarabangsa Malaysia
Language: English
Be the first to leave a comment!
You must be logged in first