Sciweavers

10044 search results - page 124 / 2009
» Authentication in Wireless Networks
Sort
View
MWCN
2004
Springer
15 years 9 months ago
Minimum Power Symmetric Connectivity Problem in Wireless Networks: A New Approach
We consider the problem of assigning transmission powers to the nodes of a wireless network in such a way that all the nodes of the network are connected by bidirectional links and...
Roberto Montemanni, Luca Maria Gambardella
139
Voted
AINA
2005
IEEE
15 years 9 months ago
Authenticated Encryption Schemes with Message Linkage for Threshold Signatures
Based on the factorization problem, a modified (t, n) threshold group-oriented scheme with message recovery is proposed. In the proposed scheme, any combination of more than t mem...
Chi-Hsiung Huang, Chia-Yin Lee, Chu-Hsing Lin, Chi...
IPCCC
2005
IEEE
15 years 9 months ago
A key distribution scheme for double authentication in link state routing protocol
The Double Authentication (DA) scheme presented in [1] is designed to provide security against impersonation attack to link state routing protocol at a lower computational cost as...
D. Huang, A. Sinha, D. Medhi
CONEXT
2008
ACM
15 years 5 months ago
Experimental approach to adaptive carrier sensing in IEEE 802.15.4 wireless networks
In carrier sense multiple access with collision avoidance (CSMA/CA) wireless networks, adaptive physical carrier sense (CS) mechanisms have been proposed to maximize spatial reuse...
Kwanhee Jeong, Hyuk Lim
149
Voted
ACNS
2008
Springer
96views Cryptology» more  ACNS 2008»
15 years 5 months ago
Efficient Device Pairing Using "Human-Comparable" Synchronized Audiovisual Patterns
Abstract. "Pairing" is referred to as the operation of achieving authenticated key agreement between two human-operated devices over a short- or medium-range wireless com...
Ramnath Prasad, Nitesh Saxena