Sciweavers

201 search results - page 21 / 41
» Applications and Security of Next-Generation, User-Centric W...
Sort
View
CCS
2001
ACM
15 years 2 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
IJNSEC
2010
143views more  IJNSEC 2010»
14 years 4 months ago
A New Secure Remote User Authentication Scheme with Smart Cards
Remote user authentication scheme is one of the simplest and the most convenient authentication mechanisms to deal with secret data over insecure networks. These types of schemes ...
Manoj Kumar
WS
2004
ACM
15 years 2 months ago
Security considerations for IEEE 802.15.4 networks
The IEEE 802.15.4 specification outlines a new class of wireless radios and protocols targeted at low power devices, personal area networks, and sensor nodes. The specification ...
Naveen Sastry, David Wagner
WMASH
2004
ACM
15 years 2 months ago
Smart edge server: beyond a wireless access point
Wireless access at cafes, airports, homes and businesses have proliferated all over the globe with several different Wireless Internet Service Providers. Similarly, digital media ...
Geetha Manjunath, Tajana Simunic, Venkatesh Krishn...
KI
2008
Springer
14 years 9 months ago
Monitoring Movement Behavior by Means of a Large Area Proximity Sensor Array in the Floor
This paper describes an innovative sensor system which can detect and track people in a room by means of an array of capacitive sensors beneath the floor covering. By combining cut...
Axel Steinhage, Christl Lauterbach