Information Technology Reference
In-Depth Information
9.
Tang, H., Zhu, L.: Efficient packet-injection resistant data source authentication protocol
for group communication. Proc. Journal on Communications 11A, 96-100 (2008)
10.
Fei, G., Hu, G.: Unicast network loss tomography based on k-th order Markov chain. Proc.
Journal of Electronics & Information Technology 33(9), 2278-2282 (2011)
11.
Yang, H., Zhu, L.: The application of data origin authentication to video multicast com-
munication. In: Proc. International Conference on Multimedia Technology (ICMT), July
26-28, pp. 5129-5132 (2011)
12.
Rabin, M.O.: Efficient dispersal of information for security, load balancing, and fault to-
lerance. Proc. J. ACM, 335-348 (1989)