Key Management For Multicast Security
This thesis investigates and analyzes each of the group key management architectures, looking in particular at their scalability and security, since multicast scalability and security are the primary motivator for this work. Our domain problem is the key management for multicast security over wired...
| Main Author: | Daw, Win Aye |
|---|---|
| Format: | Thesis |
| Published: |
2005
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/910/ |
Similar Items
E-store management using bell-lapadula access control security model
by: Roslan, Saidah Nafisah, et al.
Published: (2018)
by: Roslan, Saidah Nafisah, et al.
Published: (2018)
Internet Security In China
by: Jia, Xu
Published: (2005)
by: Jia, Xu
Published: (2005)
Learning Environment For PDA Security
by: Velu , Vengadeshwaran
Published: (2002)
by: Velu , Vengadeshwaran
Published: (2002)
Smart security system for home (IOT)
by: Abd Oun, Muhamed Obed
Published: (2020)
by: Abd Oun, Muhamed Obed
Published: (2020)
Enhancement of network security by use machine learning
by: Hasan, Ahmed Raheem
Published: (2019)
by: Hasan, Ahmed Raheem
Published: (2019)
Solving security staff scheduling by using genetic algorithm
by: Ang, Shin Yin
Published: (2021)
by: Ang, Shin Yin
Published: (2021)
Web Link Classification And Aceessibillity Modelling For Web Security Enhancement
by: Chong, Chee Way
Published: (1999)
by: Chong, Chee Way
Published: (1999)
Web Link Classification And Aceessibillity Modelling For Web Security Enhancement
by: Chong, Chee Way
Published: (1999)
by: Chong, Chee Way
Published: (1999)
Web transcript verification using check digit as secure number
by: Abd Halim, Muhamad Rais, et al.
Published: (2017)
by: Abd Halim, Muhamad Rais, et al.
Published: (2017)
Internet of things security implementation using blockchain for wireless technology
by: Karim, Karim Jabur
Published: (2019)
by: Karim, Karim Jabur
Published: (2019)
Smart home security access system using field programmable gate arrays
by: Saleh, Shukur, et al.
Published: (2018)
by: Saleh, Shukur, et al.
Published: (2018)
JXME Security: Encryption Overhead In End-To-End J2ME-JXTA Systems
by: Mazlan, Rima
Published: (2008)
by: Mazlan, Rima
Published: (2008)
A QoS Aware Cluster Head Selection and Hybrid Cryptography Routing Protocol for Enhancingm Efficiency and Security of VANET
by: JUBAIR, MOHAMMED AHMED, et al.
Published: (2022)
by: JUBAIR, MOHAMMED AHMED, et al.
Published: (2022)
A grouping scheme for secure multicasting in mobile IPv6
by: AI-Talib, Sahar, et al.
Published: (2003)
by: AI-Talib, Sahar, et al.
Published: (2003)
A secure data authentication in wireless body area network for health monitoring using electrocardiogram-based key agreement
by: Ramli, Sofia Najwa, et al.
Published: (2016)
by: Ramli, Sofia Najwa, et al.
Published: (2016)
Regionalised Mobility Management For Mobile IP
by: Tan , Wee Lum
Published: (1999)
by: Tan , Wee Lum
Published: (1999)
Regionalised Mobility Management For Mobile IP
by: Tan, Wee Lum
Published: (1999)
by: Tan, Wee Lum
Published: (1999)
MOBILE APPLICATIONS FOR FACILITIES MANAGEMENT INFORMATION
by: Zainal, Nurul Natrah, et al.
Published: (2020)
by: Zainal, Nurul Natrah, et al.
Published: (2020)
Privacy Model For Transaction Management In Mobile Databases
by: Byamba, Byambasuren
Published: (2010)
by: Byamba, Byambasuren
Published: (2010)
IP multicast
by: Mahfodh, Abdulrhman Mohammed, et al.
Published: (2011)
by: Mahfodh, Abdulrhman Mohammed, et al.
Published: (2011)
Optimization of supply chain management by simulation based RFID with XBEE Network
by: Soomro, Aftab Ahmed
Published: (2015)
by: Soomro, Aftab Ahmed
Published: (2015)
Web-based Content Management System For SMIL-Based Interactive Multimedia Content
by: Cheong, Soon Nyean
Published: (2007)
by: Cheong, Soon Nyean
Published: (2007)
Active Queue Management Using Non-Linear Adaptive Random Early Detection Mechanism
by: Ng, Boon Kiong
Published: (2006)
by: Ng, Boon Kiong
Published: (2006)
Descriptive Study Of Internet Based Learning And Diabetic Care Management Among Patients At Putrajaya Hospital
by: Mohammed, Azman
Published: (2007)
by: Mohammed, Azman
Published: (2007)
Cloud Computing based Learning Management System (CC-LMS) implementation model in Malaysia Higher Education Institutions
by: Kassim, Rahimah
Published: (2021)
by: Kassim, Rahimah
Published: (2021)
The study of multicast listener discovery
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
Introduction to mobility multicast schemes
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
Mobility approaches to support IP multicast
by: Mahfodh, Abdulrhman Mohammed, et al.
Published: (2011)
by: Mahfodh, Abdulrhman Mohammed, et al.
Published: (2011)
Adaptive MIMO-OFDM combining space-time block codes and spatial multiplexing in correlated frequency-selective channels
by: Halmi, Mohd Hairi
Published: (2005)
by: Halmi, Mohd Hairi
Published: (2005)
Providing Quality Of Service In IEEE 802.11 Wireless Local Area Network (WLAN)
by: Ng, Bryan Cheng Kuan
Published: (2005)
by: Ng, Bryan Cheng Kuan
Published: (2005)
A Case Study Of Redtone International Berhad
by: Mustafa, Muhamad Sabri
Published: (2005)
by: Mustafa, Muhamad Sabri
Published: (2005)
Wavelength Converters Placement In All Optical Networks Using Particle Swarm Optimization
by: Teo , Choon Fang
Published: (2005)
by: Teo , Choon Fang
Published: (2005)
A Case Study Of SOHU
by: Kui, Zhang Wen
Published: (2005)
by: Kui, Zhang Wen
Published: (2005)
Analysis Of Deflection Routing Multihop Lightwave Networks With Limited Number Of Wavelength Converters
by: Koa , Chong Gee
Published: (2005)
by: Koa , Chong Gee
Published: (2005)
Strategic Implications Of Multimedia Messaging Services (MMS) : Identifying The Opportunities
by: Wu, Chin Gang
Published: (2005)
by: Wu, Chin Gang
Published: (2005)
Usability Study Of Websites From The Perspective Of Student Internet Users
by: Jeyakuma, Robert
Published: (2005)
by: Jeyakuma, Robert
Published: (2005)
Analysis And Design Of Active Grating-Embedded Optical Filters
by: Lim , Kian Yong
Published: (2005)
by: Lim , Kian Yong
Published: (2005)
Evaluation Of Internet Protocal Version 6 (IPV6) Implementations And Comparative Performance Analysis On Different Platforms
by: Syed Mohamed, Sulaiman
Published: (2005)
by: Syed Mohamed, Sulaiman
Published: (2005)
Design Of A Multiwavelength Optical Light Source Using Optical Frequency Comb Generator (OFCG)
by: Thum , Ann
Published: (2005)
by: Thum , Ann
Published: (2005)
A Study On Service Convergence Within A Wireless Metropolitan Area Network (MAN) In Malaysia
by: Tan, Roy Yew Hoong
Published: (2005)
by: Tan, Roy Yew Hoong
Published: (2005)
Similar Items
-
E-store management using bell-lapadula access control security model
by: Roslan, Saidah Nafisah, et al.
Published: (2018) -
Internet Security In China
by: Jia, Xu
Published: (2005) -
Learning Environment For PDA Security
by: Velu , Vengadeshwaran
Published: (2002) -
Smart security system for home (IOT)
by: Abd Oun, Muhamed Obed
Published: (2020) -
Enhancement of network security by use machine learning
by: Hasan, Ahmed Raheem
Published: (2019)