Sciweavers

7 search results - page 1 / 2
» BAP: Broadcast Authentication Using Cryptographic Puzzles
Sort
View
ACNS
2007
Springer
147views Cryptology» more  ACNS 2007»
13 years 11 months ago
BAP: Broadcast Authentication Using Cryptographic Puzzles
Patrick Schaller, Srdjan Capkun, David A. Basin
CANS
2009
Springer
126views Cryptology» more  CANS 2009»
13 years 11 months ago
Ensuring Authentication of Digital Information Using Cryptographic Accumulators
In this paper, we study the broadcast authentication problem for both erasure and adversarial networks. Two important concerns for authentication protocols are the authentication ...
Christophe Tartary
ARESEC
2011
117views more  ARESEC 2011»
12 years 4 months ago
Non-Parallelizable and Non-Interactive Client Puzzles from Modular Square Roots
—Denial of Service (DoS) attacks aiming to exhaust the resources of a server by overwhelming it with bogus requests have become a serious threat. Especially protocols that rely o...
Yves Igor Jerschow, Martin Mauve

Publication
145views
13 years 28 days ago
Wireless Client Puzzles in IEEE 802.11 Networks: Security by Wireless
Resource-depletion attacks against IEEE 802.11 access points (APs) are commonly executed by flooding APs with fake authentication requests. Such attacks may exhaust an AP’s memor...
Ivan Martinovic, Frank A. Zdarsky, Matthias Wilhel...
IEEECIT
2010
IEEE
13 years 3 months ago
An Authentication Framework for Wireless Sensor Networks using Identity-Based Signatures
Abstract—In Wireless Sensor Networks (WSNs), authentication is a crucial security requirement to avoid attacks against secure communication, and to mitigate DoS attacks exploitin...
Rehana Yasmin, Eike Ritter, Guilin Wang