共 50 条
- [31] Resource requirement analysis for a predictive-hashing based multicast authentication protocol [J]. EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, 2006, 4097 : 302 - 311
- [32] New multicast authentication protocol for entrusted members using advanced encryption standard [J]. EGYPTIAN JOURNAL OF REMOTE SENSING AND SPACE SCIENCES, 2011, 14 (02): : 121 - 128
- [33] Integrating Encryption Technique in Authentication of Multicast Protocol for Ad-Hoc Networks [J]. 2013 THIRD INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATIONS (ICACC 2013), 2013, : 423 - 426
- [34] A New Multicast Authentication Protocol using Erasure Code Functions and Signcryption Techniques [J]. 2013 WORLD CONGRESS ON INTERNET SECURITY (WORLDCIS), 2013, : 99 - +
- [36] Multicast group authentication [J]. NETWORK CONTROL AND ENGINEERING FOR QOS, SECURITY AND MOBILITY, IV, 2007, 229 : 215 - +
- [37] CMSM - A closed multi-source IP multicast protocol [J]. Fifth International Conference on Computer and Information Technology - Proceedings, 2005, : 435 - 441
- [38] Integrated method for loss-resilient multicast source authentication and data reconstruction [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, : 5844 - 5848
- [39] Efficient multicast source authentication using layered hash-chaining scheme [J]. LCN 2004: 29TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2004, : 411 - 412
- [40] A chained multicast source authentication technology based on the threshold cryptography in a noisy channel [J]. Dianzi Yu Xinxi Xuebao, 5 (1227-1233):