Cited By
View all- Sreelaja NPai G(2009)Swarm intelligence approach of leaker identification in secure multicast2009 World Congress on Nature & Biologically Inspired Computing (NaBIC)10.1109/NABIC.2009.5393452(660-665)Online publication date: Dec-2009
- Chu HQiao LNahrstedt KWang HJain R(2002)A secure multicast protocol with copyright protectionACM SIGCOMM Computer Communication Review10.1145/568567.56857032:2(42-60)Online publication date: 1-Apr-2002