I. Introduction
We start our work from the following simple case study: assume to design an application for a device with limited space and (optionally) limited computational capabilities, operating in wireless or sensor environment. The application has to send a real-time data flow to several receivers and the data has to be protected against malicious attacks, like modification of the data flow or sender impersonation. This could be the case of a mobile user doing m-commerce transactions over wireless networks, or of a sensor being part of a sensor network, such as for military sensing and tracking, environment monitoring or patient monitoring and tracking.