Sciweavers

154 search results - page 1 / 31
» Authenticity in a Reliable Protocol for Mobile Computing
Sort
View
SAC
2003
ACM
13 years 10 months ago
Authenticity in a Reliable Protocol for Mobile Computing
Nicoletta De Francesco, Marinella Petrocchi
AVBPA
2005
Springer
256views Biometrics» more  AVBPA 2005»
13 years 10 months ago
MOC via TOC Using a Mobile Agent Framework
A novel protocol is proposed to address the problem of user authentication to smartcards using biometric authentication instead of the usual PIN. The protocol emulates expensive Ma...
Stefano Bistarelli, Stefano Frassi, Anna Vaccarell...
AINA
2006
IEEE
13 years 10 months ago
MIS Protocol for Secure Connection and Fast Handover on Wireless LAN
MIS (Mobile Internet Services) architecture is designed for secure connection and fast handover with wireless LAN. This architecture consists of three protocols, MISP (Mobile Inte...
Hitoshi Morioka, Hiroshi Mano, Motoyuki Ohrnori, M...
TC
2008
13 years 4 months ago
Computationally Efficient PKI-Based Single Sign-On Protocol, PKASSO for Mobile Devices
In an attempt to expand Public Key Infrastructure (PKI) usage to a ubiquitous and mobile computing environment, we found that the deployment of the PKI on a resource-constrained de...
Ki-Woong Park, Sang Seok Lim, Kyu Ho Park
PERCOM
2005
ACM
14 years 4 months ago
Security Analysis of Two Anonymous Authentication Protocols for Distributed Wireless Networks
In a set of distributed wireless networks, such as globally distributed cellular systems, different networks could be administered by different operators. Mobile devices subscribe...
Duncan S. Wong