Sciweavers

23 search results - page 3 / 5
» Secure 3G User Authentication in Adhoc Serving Networks
Sort
View
CRYPTO
2005
Springer
113views Cryptology» more  CRYPTO 2005»
13 years 11 months ago
Secure Communications over Insecure Channels Based on Short Authenticated Strings
Abstract. We propose a way to establish peer-to-peer authenticated communications over an insecure channel by using an extra channel which can authenticate very short strings, e.g....
Serge Vaudenay
ADHOC
2007
133views more  ADHOC 2007»
13 years 6 months ago
Secure position-based routing protocol for mobile ad hoc networks
In large and dense mobile ad hoc networks, position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location...
Joo-Han Song, Vincent W. S. Wong, Victor C. M. Leu...
PDCAT
2005
Springer
13 years 11 months ago
Trusted Computing-Based Security Architecture For 4G Mobile Networks
In this paper security requirements and security architecture for 4G systems are presented with the consideration of Trusted Computing (TC) for mobile equipment (ME). The security...
Yu Zheng, Dake He, Weichi Yu, Xiaohu Tang
CCS
2001
ACM
13 years 10 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
MOBIQUITOUS
2007
IEEE
14 years 2 days ago
Key Establishment Using Secure Distance Bounding Protocols
Key establishment is one of the major challenges in Wireless Personal Area Networks, as traditional security mechanisms often do not cope with the dynamic characteristics of wirel...
Dave Singelée, Bart Preneel