Sciweavers

7 search results - page 1 / 2
» Mutual Authentication for Low-Power Mobile Devices
Sort
View
FC
2001
Springer
94views Cryptology» more  FC 2001»
13 years 9 months ago
Mutual Authentication for Low-Power Mobile Devices
We propose methods for mutual authentication and key exchange. Our methods are well suited for applications with strict power consumption restrictions, such as wireless medical imp...
Markus Jakobsson, David Pointcheval
ASIACRYPT
2001
Springer
13 years 8 months ago
Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices
Abstract. In this paper, we consider the problem of mutually authenticated key exchanges between a low-power client and a powerful server. We show how the Jakobsson-Pointcheval sch...
Duncan S. Wong, Agnes Hui Chan
COMCOM
2004
83views more  COMCOM 2004»
13 years 4 months ago
Mutual authentication and group key agreement for low-power mobile devices
Emmanuel Bresson, Olivier Chevassut, Abdelilah Ess...
ADHOC
2007
134views more  ADHOC 2007»
13 years 4 months ago
Threshold password authentication against guessing attacks in Ad hoc networks
Password authentication has been accepted as one of the commonly used solutions in network environment to protect resources from unauthorized access. The emerging mobile Ad hoc ne...
Zhenchuan Chai, Zhenfu Cao, Rongxing Lu
MOBIQUITOUS
2007
IEEE
13 years 11 months ago
Key Establishment Using Secure Distance Bounding Protocols
Key establishment is one of the major challenges in Wireless Personal Area Networks, as traditional security mechanisms often do not cope with the dynamic characteristics of wirel...
Dave Singelée, Bart Preneel