[1]
Qing Li; Trappe, W. Reducing delay and enhancing DoS resistance in multicast authentication through multigrade security[J]. IEEE Transactions on Information Forensics and Security, 2006, vol 1, 190-204.
DOI: 10.1109/tifs.2006.873599
Google Scholar
[2]
Jinwei Wang; Shiguo Lian; Guangjie Liu. On the analysis and design of secure multimedia authentication scheme[C]. Third International Conference on Communications and Networking in China, 2008. 1298-1302.
DOI: 10.1109/chinacom.2008.4685264
Google Scholar
[3]
Chuhong Fei; Kundur, D.; Kwong, R.H. Analysis and design of secure watermark-based authentication systems[J]. IEEE Transactions on Information Forensics and Security, 2006, vol 1, issue 1, 43-55.
DOI: 10.1109/tifs.2005.863505
Google Scholar
[4]
Suzuki, S.; Nakada, K. An authentication technique based on distributed security management for the global mobility network[J]. IEEE Journal on Selected Areas in Communications, 1997, vol 15, issue 8, 1608-1617.
DOI: 10.1109/49.634798
Google Scholar
[5]
Peng Kunyu; Zheng Jiande; Yang Jing. An identity authentication system based on mobile phone token[C]. IEEE International Conference on Network Infrastructure and Digital Content, 2009. 570-575.
DOI: 10.1109/icnidc.2009.5360974
Google Scholar
[6]
Zheng, G.; Ma, H. -T.; Cheng, C.; Tu, Y. -C. Design and logical analysis on the access authentication scheme for satellite mobile communication networks[J]. IET Information Security, 2012, vol 6, issue 1, 6-13.
DOI: 10.1049/iet-ifs.2010.0233
Google Scholar
[7]
Oligeri, G.; Chessa, S.; Barsocchi, P.; Giunta, G.; Chan, P.M.L.; Pillai, P. Real-time loss tolerant video streaming authentication for satellite links[C]. International Workshop on Satellite and Space Communications, 2009, 125-129.
DOI: 10.1109/iwssc.2009.5286403
Google Scholar
[8]
Abdellatif, R.; Aslan, H.K.; Elramly, S.H. New real time multicast authentication protocol[C]. International Conference on Computer Engineering and Systems, 2008. 245-250.
DOI: 10.1109/icces.2008.4773005
Google Scholar
[9]
Piron, L.; Le Buhan, C.; Moreillon, G.; Wilson, R. On the integrity and authentication protection of real time data in broadcast networks[C]. IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2008, 1-4.
DOI: 10.1109/isbmsb.2008.4536613
Google Scholar
[10]
Bossie, C.; Fiorini, P.M. A Dynamic Authentication Mechanism for Real-Time Network Security[C]. IEEE Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2005. 360-365.
DOI: 10.1109/idaacs.2005.283004
Google Scholar