scispace - formally typeset
H

H. Bettahar

Researcher at Centre national de la recherche scientifique

Publications -  17
Citations -  375

H. Bettahar is an academic researcher from Centre national de la recherche scientifique. The author has contributed to research in topics: Multicast & IP multicast. The author has an hindex of 8, co-authored 17 publications receiving 367 citations.

Papers
More filters
Journal ArticleDOI

IP mobile multicast: Challenges and solutions

TL;DR: The challenges of IP multicast over Mobile IP are outlined, the solutions are classified into different classes in light of how the network infrastructure is used and the nature of the multicast members (receivers or sources), and the advantages and limitations are discussed.
Journal ArticleDOI

A taxonomy of multicast data origin authentication: Issues and solutions

TL;DR: This article reviews and classify recent works dealing with the data origin authentication problem in group communication, and discusses and compares them with respect to some relevant performance criteria.
Proceedings ArticleDOI

AKMP: an adaptive key management protocol for secure multicast

TL;DR: This paper proposes an efficient protocol, called AKMP, which maintains good performance by adapting the key management process to the membership frequency during the multicast session, and shows that it is more efficient than existing protocols.
Proceedings ArticleDOI

An Efficient Key Management Algorithm for Hierarchical Group Communication

TL;DR: This paper introduces private hierarchical group communication and it is determined its specific confidentiality requirements, and then an efficient key management protocol satisfying those requirements is proposed.
Proceedings ArticleDOI

A/sup 2/cast: an adaptive source authentication protocol for multicast streams

TL;DR: A new adaptive and efficient source authentication protocol which tolerates packet loss and guarantees nonrepudiation for multicast flows is proposed, and the simulation results show that the protocol has remarkable features and efficiency compared to other recent source authentication protocols.