Asian Journal of Information Technology

Year: 2016
Volume: 15
Issue: 11
Page No. 1791 - 1798

Incremental Hash Integrity Validation for Scalable and Secure Multicasting in Social Networking

Authors : R. Venkatesan and A. Sabari

References

Brooks, R.R., B. Pillai, M. Pirretti and M.C. Weigle, 2009. Multicast encryption infrastructure for security in sensor networks. Intl. J. Distrib. Sensor Networks, 5: 139-157.
CrossRef  |  Direct Link  |  

Chen, Z.Z., Z. Feng, M. Li and F. Yao, 2008. Optimizing deletion cost for secure multicast key management. Theor. Comput. Sci., 401: 52-61.
CrossRef  |  Direct Link  |  

Dong, J., R. Curtmola, C.N. Rotaru, 2011. Secure high-throughput multicast routing in wireless mesh networks. Mob. Comput. IEEE. Trans., 10: 653-668.
CrossRef  |  Direct Link  |  

He, Y., R. Yuan and W. Gong, 2010. Modeling power saving protocols for multicast services in 802.11 wireless LANs. Mob. Comput. IEEE. Trans., 9: 657-671.
CrossRef  |  Direct Link  |  

Hua, S., Y. Guo, Y. Liu, H. Liu and S.S. Panwar, 2011. Scalable video multicast in hybrid 3G/ad-hoc networks. Multimedia IEEE. Trans., 13: 402-413.
CrossRef  |  Direct Link  |  

Huang, K., Y. Chen, J. Lan and H. Jia, 2016. Random tree multicast communications in reconfigurable network. Intl. J. Future Gener. Commun. Networking, 9: 1-10.
Direct Link  |  

Madhusudhanan, B., S. Chitra and C. Rajan, 2015. Mobility based key management technique for multicast security in mobile ad hoc networks. Sci. World J., Vol. 2015,

Park, C., J. Hur, S. Hwang and H. Yoon, 2012. Authenticated public key broadcast encryption scheme secure against insiders attack. Math. Comput. Modell., 55: 113-122.
CrossRef  |  Direct Link  |  

Pathan, A.S.K., M.M. Monowar, M.F. Rabbi, M.M. Alam and C.S. Hong, 2008. NAMP: Neighbor aware multicast routing protocol for mobile ad hoc networks. Int. Arab J. Inf. Technol., 5: 102-107.
Direct Link  |  

Shang, C., B. Wong, X. Chen, W. Li and S. Oh, 2015. Community and social feature-based multicast in opportunistic mobile social networks. Proceeding of the 24th International IEEE Conference on Computer Communication and Networks, August 3-6, 2015, IEEE, Las Vegas, Nevada, pp: 1-8.

Shao, M., S. Dumitrescu and X. Wu, 2011. Layered multicast with inter-layer network coding for multimedia streaming. Multimedia IEEE. Trans., 13: 353-365.
CrossRef  |  Direct Link  |  

Sharangi, S., R. Krishnamurti and M. Hefeeda, 2011. Energy-efficient multicasting of scalable video streams over WiMAX networks. Multimedia IEEE. Trans., 13: 102-115.
CrossRef  |  Direct Link  |  

Singh, K. and R.S. Yadav, 2012. Dynamic security scheme for multicast source authentication. Proceeding of the 2nd International Conference on Computer, Communication, Control and Information Technology, February 25-26, 2012, Elsevier, Amsterdam, Netherlands, pp: 515-521.

Wang, C., X.Y. Li, C. Jiang, S. Tang and Y. Liu, 2011. Multicast throughput for hybrid wireless networks under gaussian channel model. IEEE Trans. Mob. Comput., 10: 839-852.
CrossRef  |  Direct Link  |  

Wei, T.T., C.H. Wang, Y.H. Chu and R.I. Chang, 2012. A secure and stable multicast overlay network with load balancing for scalable IPTV services. Intl. J. Digital Multimedia Broadcast., Vol. 2012,

Xiang, X., X. Wang and Y. Yang, 2011. Supporting efficient and scalable multicasting over mobile Ad Hoc networks. IEEE Trans. Mobile Comput., Vol. 10. 10.1109/TMC.2010.176

Xuan, Y. and C.T. Lea, 2011. Network-coding multicast networks with QoS guarantees. IEEE./ACM. Trans. Networking, 19: 265-274.
CrossRef  |  Direct Link  |  

Zhou, Y., X. Zhu and Y. Fang, 2010. MABS: Multicast authentication based on batch signature. Mob. Comput. IEEE. Trans., 9: 982-993.
CrossRef  |  Direct Link  |  

Zhu, B., S. Setia, S. Jajodia, S. Roy and L. Wang, 2010. Localized multicast: Efficient and distributed replica detection in large-scale sensor networks. IEEE Trans. Mobile Comput., 9: 913-926.
CrossRef  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved