Sciweavers

179 search results - page 9 / 36
» Secure Multicast in WiMAX
Sort
View
SP
2000
IEEE
115views Security Privacy» more  SP 2000»
14 years 1 days ago
Efficient Authentication and Signing of Multicast Streams over Lossy Channels
Adrian Perrig, Ran Canetti, J. D. Tygar, Dawn Xiao...
MMMACNS
2001
Springer
14 years 3 days ago
Dynamic Group Key Management Protocol
If multicast communication appears as the most efficient way to send data to a group of participants, it presents also more vulnerabilities to attacks and requires services such as...
Ghassan Chaddoud, Isabelle Chrisment, André...
SIGECOM
1999
ACM
105views ECommerce» more  SIGECOM 1999»
13 years 12 months ago
Nark: receiver-based multicast non-repudiation and key management
The goal of this work is to separately control individual secure sessions between unlimited pairs of multicast receivers and senders while preserving the scalability of receiver i...
Bob Briscoe, Ian Fairman
ICICS
2005
Springer
14 years 1 months ago
Secure Multicast Using Proxy Encryption
In a secure multicast communication environment, only valid members belong to the multicast group could decrypt the data. In many previous researches, there is one “group key” ...
Yun-Peng Chiu, Chin-Laung Lei, Chun-Ying Huang
IJNSEC
2007
109views more  IJNSEC 2007»
13 years 7 months ago
SeReRoM: Secured Reliable Routing Scheme for Multicasting
This paper proposes a multipath routing scheme SeReRoM for a multicast group communication with a single source and multiple destinations. SeReRoM provides an environment that tac...
Rajavelu Srinivasan, V. Vaidehi, K. N. Srivathsan,...