Computer Science ›› 2006, Vol. 33 ›› Issue (3): 108-109.

Previous Articles     Next Articles

  

  • Online:2018-11-17 Published:2018-11-17

Abstract: In forwarding multicast the way of switching data is not point to point, the traditional security model on end to end is not conformable. The approaches solve the problem, which forwarding multicast data, all of multicast receivers must know a common key

Key words: Network security, Source specific multicast, Public key, Session key

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!