Key trees and the security of interval multicast

Mohamed G. Gouda*, Chin Tser Huang, E. N. Elnozahy

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

21 Scopus citations

Fingerprint

Dive into the research topics of 'Key trees and the security of interval multicast'. Together they form a unique fingerprint.

Computer Science