This paper presents an architecture for resource sharing in Personal Networks (PNs). Resources are not necessarily in the same authentication domain and the group that uses them is...
Traditionally, intrusion detection systems detect intrusions at the operating system (OS) level. In this paper we explore the possibility of detecting intrusion at the application...
Recently, a universally composable framework for RFID authentication protocols providing availability, anonymity, and authenticity was proposed. In this paper we extend that frame...
— A novel cross-layer call admission control policy is proposed for a general CDMA beamforming system. In contrast to previously proposed call admission control (CAC) policies wh...
In 2005, Lee, Kim, and Yoo proposed a nonce-based mutual authentication scheme using smart cards. However, this paper demonstrates that Lee-Kim-Yoo's scheme is vulnerable to ...