Return to Article Details
A source authentication and data confidentiality scheme based on TESLA protocol and XOR encryption for multicast
Download
Download PDF