User-Information-Aware D2D Multicast File Distribution Mechanism
There are a large number of redundant transmissions in current D2D multicast content delivery systems, which seriously reduces the utilization efficiency of resources.
Hongcheng Huang +4 more
doaj +1 more source
Protection remontante des communications multicast
La protection des communications multicast devient de plus en plus importante avec l'avènement et la multiplication des applications multicast temps réel telles que la vidéo à la demande, la vidéo conférence, le jeu en réseau, etc. Ces applications sont sensibles aux ruptures des communications et ont besoin de tourner sur des réseaux robustes et ...
Saidi, Mohand Yazid +2 more
openaire +1 more source
A Novel Real Time Framework for Cluster Based Multicast Communication in Vehicular Ad Hoc Networks
In a vehicular ad hoc network (VANET), the vehicles communicate with each other to develop an intelligent transport system (ITS) which provides safety and convenience while driving.
Waqar Farooq +2 more
doaj +1 more source
Secure multicast communications
The basic aim of this thesis is to survey the concept of multicasting and security issues surrounding multicast. It provides insights into the issues related to IP multicast security and to the possible directions of future developments. Three main areas were identified and discussed, namely multicast key management, multicast data authentication, and
openaire +1 more source
MSA-SDMN: multicast source authentication scheme for multi-domain software defined mobile networks
Multicast services provide an efficient way of conserving resources and reducing network traffic for multicast senders. However, ensuring security, particularly source authentication, is crucial for applications such as online news, IPTV, video streaming,
Hamdi Eltaief +2 more
doaj +1 more source
The multidriver: A reliable multicast service using the Xpress Transfer Protocol [PDF]
A reliable multicast facility extends traditional point-to-point virtual circuit reliability to one-to-many communication. Such services can provide more efficient use of network resources, a powerful distributed name binding capability, and reduced ...
Dempsey, Bert J. +2 more
core +1 more source
A Scalable Video Multicast Scheme Based on User Demand Perception and D2D Communication. [PDF]
Ouyang R +5 more
europepmc +1 more source
Multicast communication protocol based on quantum key distribution against trojan horse attacking
A multicast communication protocol over quantum channel against Trojan horse attacking was proposed, in the network with one source quantum node and M target quantum nodes.
Hong-yang MA, Xing-kui FAN
doaj +2 more sources
DLSMR: Deep Learning-Based Secure Multicast Routing Protocol against Wormhole Attack in Flying Ad Hoc Networks with Cell-Free Massive Multiple-Input Multiple-Output. [PDF]
Pramitarini Y +3 more
europepmc +1 more source

