Amanote Research

Amanote Research

    RegisterSign In

Resource Requirement Analysis for a Predictive-Hashing Based Multicast Authentication Protocol

Lecture Notes in Computer Science - Germany
doi 10.1007/11807964_31
Full Text
Open PDF
Abstract

Available in full text

Categories
Computer ScienceTheoretical Computer Science
Date

January 1, 2006

Authors
Seonho ChoiYanggon Kim
Publisher

Springer Berlin Heidelberg


Related search

New Real Time Multicast Authentication Protocol

2008English

PUF Based Authentication Protocol for IoT

Symmetry
MathematicsChemistryPhysicsComputer ScienceAstronomy
2018English

MABS: Multicast Authentication Based on Batch Signature

IEEE Transactions on Mobile Computing
Computer NetworksElectronic EngineeringSoftwareElectricalCommunications
2010English

Evaluation of JPEG2000 Hashing for Efficient Authentication

2009English

A Reliable PLCP-based Multicast Protocol for IEEE 802.11 WLAN

2011English

Universal Hashing and Multiple Authentication

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
1996English

A Robust ECC Based Mutual Authentication Protocol With Anonymity for Session Initiation Protocol

PLoS ONE
Multidisciplinary
2017English

Analysis of a Biometric Authentication Protocol for Signature Creation Application

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2008English

A Receiver Based Single-Layer Multicast Congestion Control Protocol for Multimedia Streaming

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2004English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy