Amanote Research

Amanote Research

    RegisterSign In

Effective Message Authentication Method for Performing a Swarm Flight of Drones

doi 10.2991/eers-15.2015.23
Full Text
Open PDF
Abstract

Available in full text

Date

January 1, 2015

Authors
Yun-seok LeeEun KimYoung-sub KimDong-chul Seol
Publisher

Atlantis Press


Related search

Delayed-Key Message Authentication for Streams

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2010English

Assessment Simulation Model for Uncoupled Message Authentication

2017English

Efficient Parallel-Pipelined GHASH for Message Authentication

2012English

Message Authentication With a New Quantum Hash Function

Computers, Materials and Continua
Mechanics of MaterialsElectronic EngineeringSimulationComputer Science ApplicationsElectricalModelingBiomaterials
2019English

A Tight Bound for Exhaustive Key Search Attacks Against Message Authentication Codes

RAIRO - Theoretical Informatics and Applications
MathematicsComputer Science ApplicationsSoftware
2012English

Anonymous Group Message Authentication Protocol for LTE-based V2X Communications

Internet Technology Letters
2018English

Method for Performing a Human-Factors Reliability Analysis

1963English

A Novel Authentication Method for Big Data Environment

International Journal of Recent Technology and Engineering
EngineeringManagement of TechnologyInnovation
2019English

A New Method for Authentication Based on Covert Channel

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2011English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy