Ghada F. El-Kabbany

Learn More
Group communication can benefit from Internet Protocol (IP) multicast protocol to achieve efficient exchange of messages. However, IP multicast does not provide any mechanisms for authentication. In literature, many solutions to solve this problem were presented. It has been shown that Wong and Lam protocol is the only protocol that can resist both packet(More)
Cryptography offers effective techniques to ensure users’ security and privacy in an efficient way. To protect networks from intruders/attackers and transmit a message over an insecure channel, encryption and digital signature algorithms could be used within different designs to provide secure networks and security solutions in order to protect users’(More)
We take some parts of a theoretical mobility model in a two-dimension grid proposed by Greenlaw and Kantabutra to be our model. The model has eight necessary factors that we commonly use in a mobile wireless network: sources or wireless signal providers, the directions that a source can move, users or mobile devices, the given directions which define a(More)
The key distribution problem is considered one of the most important issues for providing secure multicast communication. Logical Key Hierarchy (LKH) protocols are considered one of the best solutions proposed for solving the scalability of multicast key distribution protocols. The use of LKH protocols reduces the computation complexity cost from O(n),(More)
  • 1