2012
DOI: 10.5120/4583-6503
|View full text |Cite
|
Sign up to set email alerts
|

MAC based Approaches for Multicast Source Authentication

Abstract: Due to increased use of internet for novel types of group communication and bandwidth constraints an urgent need of simultaneous transmission of digital data arises. The applications of multicasting involve TV over internet, videoconferencing, news feeds, stock quotes, online video games and software updates. Some of these applications follow one to many models while others use many to many communications. But success of these applications depends on the factor that how secure they are. Each application has it… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 8 publications
0
1
0
Order By: Relevance
“…MACs are extensively used in a variety of security protocols and applications, like network communication, secure data storage, banking applications, and validation techniques. They offer a reliable way to confirm the authenticity and integrity of data, thereby establishing themselves as an element of secure communication [ 55 , 56 ].…”
Section: Proposed Methodologymentioning
confidence: 99%
“…MACs are extensively used in a variety of security protocols and applications, like network communication, secure data storage, banking applications, and validation techniques. They offer a reliable way to confirm the authenticity and integrity of data, thereby establishing themselves as an element of secure communication [ 55 , 56 ].…”
Section: Proposed Methodologymentioning
confidence: 99%