1
کامپیوتر و شبکه::
کد احراز هویت پیام
Cryptographic authen- tication techniques employ cryptography primitives such as digital signature or MAC (Message Authentication Code) to ensure data authenticity [31]-[33]; Watermarking-based authentication schemes embed a reference object (e.g.
, video number), and its MAC is
Especially, as only the authenticated token σG for the passing-by train is transmitted over WiFi networks, the WiFi communication overhead is merely one MAC for each group.
attacker is able to fake a (truncated if any) group codestream ttˇ including NALUs {Uˇi}, patch eˇ and MAC σGˇ , and an innocent train can not identify whether ttˇ is bogus or not.
σGˇ = H(hGˇ , kTid) (15) That is to say, the adversary is able to create a new MAC σGˇ
واژگان شبکه مترجمین ایران