Sciweavers

18 search results - page 1 / 4
» Symmetric Key Authentication Services Revisited
Sort
View
ACISP
2004
Springer
13 years 11 months ago
Symmetric Key Authentication Services Revisited
Bruno Crispo, Bogdan C. Popescu, Andrew S. Tanenba...
ESAS
2004
Springer
13 years 11 months ago
Public Key Cryptography in Sensor Networks - Revisited
The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless...
Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar
IPPS
2007
IEEE
13 years 12 months ago
Authentication in Reprogramming of Sensor Networks for Mote Class Adversaries
Reprogramming is an essential service for wireless sensor networks. Authenticating reprogramming process is important as sensors need to verify that the code image is truly from a...
Limin Wang, Sandeep S. Kulkarni
ISPA
2005
Springer
13 years 11 months ago
Hybrid Authentication and Key Management Scheme for WSANs
:Wireless Sensor and Actor Networks (WSANs) consist of three types of nodes with different capabilities and functions. Because of these heterogeneities, current network security ...
Xiaomei Cao, Mao Lin Huang, YueQuan Chen, Guihai C...
ACNS
2008
Springer
132views Cryptology» more  ACNS 2008»
13 years 12 months ago
Analysis of EAP-GPSK Authentication Protocol
Abstract. The EAP-GPSK protocol is a lightweight, flexible authentication protocol relying on symmetric key cryptography. It is part of an ongoing IETF process to develop authenti...
John C. Mitchell, Arnab Roy, Paul Rowe, Andre Sced...