Sciweavers

1259 search results - page 15 / 252
» An Efficient Mobile Authentication Scheme for Wireless Netwo...
Sort
View
INFOCOM
2010
IEEE
15 years 9 days ago
CapAuth: A Capability-based Handover Scheme
—Existing handover schemes in wireless LANs, 3G/4G networks, and femtocells rely upon protocols involving centralized authentication servers and one or more access points. These ...
Liang Cai, Sridhar Machiraju, Hao Chen
121
Voted
AINA
2006
IEEE
15 years 5 months ago
An Adaptive Multipath Protocol for Efficient IP Handoff in Mobile Wireless Networks
Achieving IP handoff with a short latency and minimal packet loss is essential for mobile devices that roam across IP subnets. Many existing solutions require changes to be made t...
Ken C. K. Tsang, Roy S. C. Ho, Mark C. M. Tsang, C...
MOBICOM
1996
ACM
15 years 6 months ago
Security on the Move: Indirect Authentication using Kerberos
Even as mobile computing and network computing are gaining momentum, Internet security is sharing the spotlight. Security and authentication on open networks is already a difficul...
Armando Fox, Steven D. Gribble
IJNSEC
2006
110views more  IJNSEC 2006»
15 years 1 months ago
The Improvement of YSYCT Scheme for Imbalanced Wireless Network
Recently, Yeh et al. proposed an improved password authenticated key exchange scheme (YSYCT scheme) which is secure against undetectable on-line password guessing attacks and prov...
Jung-Wen Lo
GI
2005
Springer
15 years 7 months ago
A new approach towards authenticated key agreement schemes for resource-constrained devices
: This paper describes a novel solution for authenticated key agreement for wireless sensor networks (WSN) in logistics. The retrieved data may not be spoofed as it is used to gene...
Christian Gorecki, Christian Behrens, Rainer Laur