Return to Article Details A source authentication and data confidentiality scheme based on TESLA protocol and XOR encryption for multicast Download Download PDF