A Hash-Chain Based Method for Full or Partial Authentication of Communication in a Real-Time Wireless Environment
Real-time media streams are a common application on the Internet today. For many such streams, it is necessary to provide authentication, data integrity, and non-repudiation. Some applications where this type of security may be necessary include voice-over-IP (VoIP) calls, transmission of sensitive...
Main Author: | |
---|---|
Language: | en |
Published: |
2010
|
Subjects: | |
Online Access: | http://hdl.handle.net/10012/5281 |
Search Result 1