Source authentication and data confidentiality are needed in many multicast applications. Most research attempted to solve either the source authentication or the confidentiality of data. This paper proposes a scheme that can treat the two problems together. Our scheme uses the TESLA protocol to ensure the source authentication and XOR encryption to ensure the confidentiality of the transmitted information so that the scheme can be applied to low bandwidth applications without requiring high computation devices. Furthermore, it tolerates packet-loss. These advantages render the proposed scheme secure in terms of authentication and confidentiality and it does not cost much
Abstract- Multicast Security is one of the important problems to solve for the successful deployment...
Multicast is rapidly becoming an important mode of communication as well as a good platform for buil...
Title from screen page; viewed 10 Oct 2005.Thesis (PhD)--Macquarie University, Division of Informati...
One of the main challenges of securing multicast communication is source authentication, or enabling...
Abstract- Today there is a widening in digital technologies and increasing in new multimedia service...
Today there is a widening in digital technologies and increasing in new multimedia services like: pa...
AbstractToday there is a widening in digital technologies and increasing in new multimedia services ...
Providing authentication mechanisms for IP-Multicast streams is paramount for the development of lar...
With the advent of digital technologies and widening Internet bandwidth in recent years there has be...
Multicast research has explored the security challenges faced in group communications. Multicast tra...
Multicast research has explored the security challenges faced in group communications. Multicast tra...
Multicast stream authentication and signing is an important and challenging problem. Applications in...
Multicasting is an efficient way to deliver data to large of users in applications such as Internet ...
This document details the Timed Efficient Stream Loss-Tolerant Authentication (TESLA) packet source ...
The lack of security obstructs a large scale de- ployment of the multicast communication model. Ther...
Abstract- Multicast Security is one of the important problems to solve for the successful deployment...
Multicast is rapidly becoming an important mode of communication as well as a good platform for buil...
Title from screen page; viewed 10 Oct 2005.Thesis (PhD)--Macquarie University, Division of Informati...
One of the main challenges of securing multicast communication is source authentication, or enabling...
Abstract- Today there is a widening in digital technologies and increasing in new multimedia service...
Today there is a widening in digital technologies and increasing in new multimedia services like: pa...
AbstractToday there is a widening in digital technologies and increasing in new multimedia services ...
Providing authentication mechanisms for IP-Multicast streams is paramount for the development of lar...
With the advent of digital technologies and widening Internet bandwidth in recent years there has be...
Multicast research has explored the security challenges faced in group communications. Multicast tra...
Multicast research has explored the security challenges faced in group communications. Multicast tra...
Multicast stream authentication and signing is an important and challenging problem. Applications in...
Multicasting is an efficient way to deliver data to large of users in applications such as Internet ...
This document details the Timed Efficient Stream Loss-Tolerant Authentication (TESLA) packet source ...
The lack of security obstructs a large scale de- ployment of the multicast communication model. Ther...
Abstract- Multicast Security is one of the important problems to solve for the successful deployment...
Multicast is rapidly becoming an important mode of communication as well as a good platform for buil...
Title from screen page; viewed 10 Oct 2005.Thesis (PhD)--Macquarie University, Division of Informati...