Nothing Special   »   [go: up one dir, main page]

×
Please click here if you are not redirected within a few seconds.
Abstract: Message authentication is considered as a serious bottleneck to multicast security, particular for stream-type of traffic.
Message authentication is considered as a serious bottleneck to multicast security, particular for stream-type of traffic. The technique of hash ...
In this paper, we introduce the notion of dependence-graphs which links these hash-chained authentication schemes to the well-known graph theory.
Message authentication is considered as a serious bottle- neck to multicast security, particular for stream-type of traf-.
In this paper, we introduce the notionof dependence-graphs which links these hash-chained authenticationschemes to the well-known graph theory, andprovides an ...
People also ask
Bibliographic details on A graph-theoretical analysis of multicast authentication.
“…The authors of [7] and [8] give analysis of hash chains based on graph theory. They show that to increase the authentication probability, which is defined as ...
Dec 8, 2008 · A graph-theoretical analysis of multicast authentication. Proceedings of the 23rd International Conference on Distributed Computing Systems ...
Chan A (2003) A graph-theoretical analysis of multicast authentication. In: Proceedings of the 23rd international conference on distributed computing ...
A graph-based new amortization scheme for multicast streams authentication that achieves stronger resistance against packet loss and reduces the overhead in ...