Article Comments

Contributions from readers on our articles are very welcome. This form will let us retrieve the current data in the database and allows us to consider your comments.

A source authentication scheme using network coding
Ahmed Fathy; Tamer ElBatt; Moustafa Youssef
International Journal of Security and Networks (IJSN), 2011 Vol.6 No.2/3, pp.101 - 111
8 + 7 =

Thank you for your feedback.