Secured, Authenticated Communication Model for Dynamic Multicast Groups
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 7
Abstract
Secure Multicast networks forms the backbone for many web and multimedia applications such as Interactive TV, Teleconference etc. The main challenge for secure multicast is scalability, efficiency and authenticity. A communication model is proposed for dynamic multicast groups which is secure and authenticated. In this scheme a group is established and the ext messages are transmitted between the users of the group. The proposed scheme is secured, authenticated and supports communication between dynamic multicast groups.
Authors and Affiliations
Prof J. ASHOK , KOMATI SATHISH , Y. RAJU
Automatic Counting Cancer Cell Colonies using GIEA for TSK-type Neural Fuzzy Network
This paper proposes a TSK-type neural fuzzy network (TNFN) with a group interaction-based evolutionary algorithm (GIEA) for constructing the cancer cell colonies diagnosis system (CCCDS). The proposed GIEA is designed on...
Study of Efficient Technique Based On 2D Tsallis Entropy For Image Thresholding
Thresholding is an important task in image processing. It is a main tool in pattern recognition, image segmentation, edge detection and scene analysis. In this paper, we present a new thresholding technique based on two-...
Characterization of Tiny Interpolated Objects Using B-Spline Computation
In this paper a novel medical image processing system is discussed. A modified algorithm for the reduced hardware has been designed. Finally some suitable modification in the hardware is made. In Medical Image Processing...
Common Framework For Unix Scripting Languages
With the thousands of commands available for the command line user to write own application based on some complex shell script or other script. The complexity implies more difficulties to make an efficient monitoring, ma...
Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network
Mobile ad hoc networks are formed by co operative association of wireless nodes communicating with each other without the use of infrastructure. Every node acts as a router in the network and enables the communication be...