Computer Science ›› 2006, Vol. 33 ›› Issue (3): 108-109.
Previous Articles Next Articles
Online:
Published:
Abstract: In forwarding multicast the way of switching data is not point to point, the traditional security model on end to end is not conformable. The approaches solve the problem, which forwarding multicast data, all of multicast receivers must know a common key
Key words: Network security, Source specific multicast, Public key, Session key
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2006/V33/I3/108
Cited