A source authentication and data confidentiality scheme for multicast networks
Source authentication and data confidentiality are needed in many multicast applications. Most research attempted to solve either the source authentication or the confidentiality of data. This paper proposes a scheme that can treat the two problems together. Our scheme uses the TESLA protocol to ens...
| Main Authors: | Benmachiche, Abderrahim, Ali, Salami, Messikh Azeddine, Azeddine |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IIUM Press
2016
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/53007/ http://irep.iium.edu.my/53007/1/53007_A%20source%20authentication%20and%20data%20confidentiality%20scheme.pdf |
Similar Items
Rotation gates with controlled adiabatic evolutions in open systems
by: Benmachiche, Abderrahim, et al.
Published: (2018)
by: Benmachiche, Abderrahim, et al.
Published: (2018)
Quantum rotation gates with controlled nonadiabatic evolutions
by: Abdelrahim, Abdelrahman A H, et al.
Published: (2018)
by: Abdelrahim, Abdelrahman A H, et al.
Published: (2018)
Introduction to mathematical statistics
by: Messikh Azeddine, Azeddine
Published: (2016)
by: Messikh Azeddine, Azeddine
Published: (2016)
Spin squeezing as a measure of entanglement in a two-qubit system
by: Messikh Azeddine, Azeddine, et al.
Published: (2003)
by: Messikh Azeddine, Azeddine, et al.
Published: (2003)
Secured Communication Mechanism For Message Authentication And Data Confidentiality In Secs/Gem Protocol
by: Jaisan S M, Ashish
Published: (2024)
by: Jaisan S M, Ashish
Published: (2024)
An approach to enhance aggregated source specific multicast scheme
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2008)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2008)
Effect of dephasing on superadiabatic three-level quantum driving
by: Issoufa, Youssouf Hamidou, et al.
Published: (2014)
by: Issoufa, Youssouf Hamidou, et al.
Published: (2014)
Node status detection and information diffusion in router network using scale-free network
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
Simple quantum circuit for pattern recognition based on nearest mean classifier
by: Mahmoud Ahmed, Gharib Subhi, et al.
Published: (2016)
by: Mahmoud Ahmed, Gharib Subhi, et al.
Published: (2016)
Simulation of absorption spectrum of photosynthetic pigments of chlorella vulgaris B algae
by: Mahmoud Ahmed, Gharib Subhi, et al.
Published: (2016)
by: Mahmoud Ahmed, Gharib Subhi, et al.
Published: (2016)
An approach to enhance aggregated source specific multicast scheme
by: Aisha-Hassan A. Hashim,, et al.
Published: (2008)
by: Aisha-Hassan A. Hashim,, et al.
Published: (2008)
Improvement of secure communication with continuous variable entanglement of squeezed coherent states via heterodyne detection
by: Becir, A, et al.
Published: (2010)
by: Becir, A, et al.
Published: (2010)
Superadiabatic STIRAP: population transfer and quantum rotation gates
by: Youssouf, Hamidou Issoufa, et al.
Published: (2016)
by: Youssouf, Hamidou Issoufa, et al.
Published: (2016)
Evolution of the two-mode entangled states with an atomic coupler
by: Mahmoud Ahmed, Gharib Subhi, et al.
Published: (2016)
by: Mahmoud Ahmed, Gharib Subhi, et al.
Published: (2016)
Shield Laws and Confidential Sources: Data retention’s threat to shield laws
by: Fernandez, Joseph
Published: (2015)
by: Fernandez, Joseph
Published: (2015)
Introduction to mobility multicast schemes
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
Generation of single qubit rotation gates using
superadiabatic approach
by: Issoufa, Youssouf Hamidou, et al.
Published: (2015)
by: Issoufa, Youssouf Hamidou, et al.
Published: (2015)
A comparative study of source specific multicast and aggregated source specific multicast
by: Ahmad, Taqiyuddi, et al.
Published: (2008)
by: Ahmad, Taqiyuddi, et al.
Published: (2008)
Multicast-unicast key management scheme in IPv6 networks
by: Mehdizadeh, Abbas, et al.
Published: (2014)
by: Mehdizadeh, Abbas, et al.
Published: (2014)
Confidentiality
by: Jahn Kassim, Puteri Nemie
Published: (2019)
by: Jahn Kassim, Puteri Nemie
Published: (2019)
The effect of finite bandwidth squeezed light on entanglement creation in the Dicke model
by: Messikh Azeddine, Azeddine, et al.
Published: (2004)
by: Messikh Azeddine, Azeddine, et al.
Published: (2004)
Anticlone Gaussian attack for continuous variable EPR correlations
by: Messikh Azeddine, Azeddine, et al.
Published: (2007)
by: Messikh Azeddine, Azeddine, et al.
Published: (2007)
A key distribution scheme for secure multicast over IPv6 wireless networks
by: Aye, Win Lye, et al.
Published: (2005)
by: Aye, Win Lye, et al.
Published: (2005)
Secure multicast group communication scheme in wireless IPv6 networks
by: Mehdizadeh, Abbas, et al.
Published: (2014)
by: Mehdizadeh, Abbas, et al.
Published: (2014)
Watson–Crick context-free grammars: Grammar simplifications and a parsing algorithm
by: Mohamad Zulkufli, Nurul Liyana, et al.
Published: (2018)
by: Mohamad Zulkufli, Nurul Liyana, et al.
Published: (2018)
Confidentiality to service medical emergency model
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
Evaluation of an enhanced multicast data flow technique in network mobility
by: Mohd Aman, Azana Hafizah, et al.
Published: (2016)
by: Mohd Aman, Azana Hafizah, et al.
Published: (2016)
Pass the Source—Journalism’s Confidentiality Bane in the Face of Legislative Onslaughts
by: Fernandez, Joseph
Published: (2017)
by: Fernandez, Joseph
Published: (2017)
Atomic coupler with two-mode squeezed vacuum states
by: Messikh Azeddine, Azeddine, et al.
Published: (2016)
by: Messikh Azeddine, Azeddine, et al.
Published: (2016)
The computational power of Watson-Crick grammars: Revisited
by: Mohamad Zulkufli, Nurul Liyana, et al.
Published: (2016)
by: Mohamad Zulkufli, Nurul Liyana, et al.
Published: (2016)
Generative power and closure properties of Watson-Crick grammars
by: Mohamad Zulkufli, Nurul Liyana, et al.
Published: (2016)
by: Mohamad Zulkufli, Nurul Liyana, et al.
Published: (2016)
Atomic coupler with two-mode squeezed vacuum state
by: Messikh Azeddine, Azeddine, et al.
Published: (2016)
by: Messikh Azeddine, Azeddine, et al.
Published: (2016)
Three level atom in bad cavity
by: Messikh Azeddine, Azeddine, et al.
Published: (2013)
by: Messikh Azeddine, Azeddine, et al.
Published: (2013)
Optimized routing algorithm for mobile multicast source in Wireless Mesh Networks
by: Sanni, Mistura Laide, et al.
Published: (2015)
by: Sanni, Mistura Laide, et al.
Published: (2015)
Multicast Network Security using Quantum Key Distribution (QKD)
by: Ali, Sellami, et al.
Published: (2012)
by: Ali, Sellami, et al.
Published: (2012)
A key distribution scheme for secure multicast over IPv6 wireless networks
by: Aye, Win, Win, et al.
Published: (2005)
by: Aye, Win, Win, et al.
Published: (2005)
A grouping scheme for secure multicasting in mobile IPv6
by: AI-Talib, Sahar, et al.
Published: (2003)
by: AI-Talib, Sahar, et al.
Published: (2003)
Legal Implications in Breaching Patient Confidentiality through Social Networks
by: Jahn Kassim, Puteri Nemie
Published: (2012)
by: Jahn Kassim, Puteri Nemie
Published: (2012)
Enhancement of multicast network security
by: Ali, Sellami, et al.
Published: (2013)
by: Ali, Sellami, et al.
Published: (2013)
A model for ensuring data confidentiality: In healthcare and medical emergency
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
Similar Items
-
Rotation gates with controlled adiabatic evolutions in open systems
by: Benmachiche, Abderrahim, et al.
Published: (2018) -
Quantum rotation gates with controlled nonadiabatic evolutions
by: Abdelrahim, Abdelrahman A H, et al.
Published: (2018) -
Introduction to mathematical statistics
by: Messikh Azeddine, Azeddine
Published: (2016) -
Spin squeezing as a measure of entanglement in a two-qubit system
by: Messikh Azeddine, Azeddine, et al.
Published: (2003) -
Secured Communication Mechanism For Message Authentication And Data Confidentiality In Secs/Gem Protocol
by: Jaisan S M, Ashish
Published: (2024)