Sciweavers

279 search results - page 10 / 56
» Authentication Protocols for Personal Communication Systems
Sort
View
149
Voted
MOBICOM
2004
ACM
15 years 7 months ago
Towards service and user discovery on wireless networks
This work presents a user position management system for Wi-Fi networks. The location system is based on access point coverage range and beacon devices. The implementation was mad...
Andrei Oliveira da Silva, Paulo Henrique de Souza ...
114
Voted
WISEC
2009
ACM
15 years 8 months ago
Link-layer protection in 802.11i WLANS with dummy authentication
The current 802.11i standard can provide data confidentiality, integrity and mutual authentication in enterprise Wireless Local Area Networks (WLANs). However, secure communicati...
Zhimin Yang, Adam C. Champion, Boxuan Gu, Xiaole B...
123
Voted
CASES
2010
ACM
14 years 12 months ago
Low cost multicast authentication via validity voting in time-triggered embedded control networks
Wired embedded networks must include multicast authentication to prevent masquerade attacks within the network. However, unique constraints for these networks make most existing m...
Christopher Szilagyi, Philip Koopman
121
Voted
CNSR
2010
IEEE
145views Communications» more  CNSR 2010»
15 years 5 months ago
Securing the Communications of Home Health Care Systems Based on RFID Sensor Networks
We address security solutions to protect the communication of the wireless components of a home health care system. We analyze especially the problem of exchanging secrets to sati...
Wiem Tounsi, Joaquín García-Alfaro, ...
152
Voted
FC
2007
Springer
125views Cryptology» more  FC 2007»
15 years 8 months ago
Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups
Task-specific groups are often formed in an ad-hoc manner within big structures, like companies. Take the following typical scenario: A high rank manager decides that a task force...
Yvo Desmedt, Tanja Lange, Mike Burmester