Information Technology Reference
In-Depth Information
9. Tang, H., Zhu, L.: Efficient packet-injection resistant data source authentication protocol
for group communication. Proc. Journal on Communications 11A, 96-100 (2008)
10. Fei, G., Hu, G.: Unicast network loss tomography based on k-th order Markov chain. Proc.
Journal of Electronics & Information Technology 33(9), 2278-2282 (2011)
11. Yang, H., Zhu, L.: The application of data origin authentication to video multicast com-
munication. In: Proc. International Conference on Multimedia Technology (ICMT), July
26-28, pp. 5129-5132 (2011)
12. Rabin, M.O.: Efficient dispersal of information for security, load balancing, and fault to-
lerance. Proc. J. ACM, 335-348 (1989)
 
Search WWH ::




Custom Search