First Page | Document Content | |
---|---|---|
Network protocols Wireless networking Distributed data storage Internet broadcasting Multicast Routing Secure multicast Network topology Wireless ad-hoc network Network architecture Internet Computing | D:Documents and SettingsLoukasDesktopvtc04hier_tree.epsAdd to Reading ListSource URL: www2.engr.arizona.eduDownload Document from Source WebsiteFile Size: 103,32 KBShare Document on Facebook |
Proceedings of the Internet Society Network and Distributed System Security Symposium (NDSS 2001), February 2001, ppEfficient and Secure Source Authentication for Multicast Adrian PerrigDocID: 1vl5q - View Document | |
Towards a More Functional and Secure Network Infrastructure Daniel Adkins Karthik Lakshminarayanan Adrian Perrig Ion Stoica UC Berkeley UC Berkeley CMUDocID: 1qSvj - View Document | |
40 Int. J. Security and Networks, Vol. 6, No. 1, 2011 Application-aware secure multicast for power grid communicationsDocID: 1nN1g - View Document | |
Application-Aware Secure Multicast for Power Grid Communications Jianqing Zhang Carl A. GunterDocID: 1ncQu - View Document | |
© 2010 Jianqing Zhang SECURE MULTICAST FOR POWER GRID COMMUNICATIONS BY JIANQING ZHANGDocID: 1n3v0 - View Document |