Sciweavers

10044 search results - page 124 / 2009
» Authentication in Wireless Networks
Sort
View
MWCN
2004
Springer
15 years 4 months ago
Minimum Power Symmetric Connectivity Problem in Wireless Networks: A New Approach
We consider the problem of assigning transmission powers to the nodes of a wireless network in such a way that all the nodes of the network are connected by bidirectional links and...
Roberto Montemanni, Luca Maria Gambardella
AINA
2005
IEEE
15 years 5 months ago
Authenticated Encryption Schemes with Message Linkage for Threshold Signatures
Based on the factorization problem, a modified (t, n) threshold group-oriented scheme with message recovery is proposed. In the proposed scheme, any combination of more than t mem...
Chi-Hsiung Huang, Chia-Yin Lee, Chu-Hsing Lin, Chi...
IPCCC
2005
IEEE
15 years 5 months ago
A key distribution scheme for double authentication in link state routing protocol
The Double Authentication (DA) scheme presented in [1] is designed to provide security against impersonation attack to link state routing protocol at a lower computational cost as...
D. Huang, A. Sinha, D. Medhi
CONEXT
2008
ACM
15 years 1 months ago
Experimental approach to adaptive carrier sensing in IEEE 802.15.4 wireless networks
In carrier sense multiple access with collision avoidance (CSMA/CA) wireless networks, adaptive physical carrier sense (CS) mechanisms have been proposed to maximize spatial reuse...
Kwanhee Jeong, Hyuk Lim
ACNS
2008
Springer
96views Cryptology» more  ACNS 2008»
15 years 1 months ago
Efficient Device Pairing Using "Human-Comparable" Synchronized Audiovisual Patterns
Abstract. "Pairing" is referred to as the operation of achieving authenticated key agreement between two human-operated devices over a short- or medium-range wireless com...
Ramnath Prasad, Nitesh Saxena