Sciweavers

10044 search results - page 128 / 2009
» Authentication in Wireless Networks
Sort
View
ICUIMC
2009
ACM
15 years 6 months ago
Bilinear-pairing-based remote user authentication schemes using smart cards
This paper presents a detailed review of remote user authentication schemes with smart cards based on bilinear pairings. The first scheme regarding this was proposed by Manik et a...
Al-Sakib Khan Pathan, Choong Seon Hong
CORR
2010
Springer
111views Education» more  CORR 2010»
14 years 11 months ago
Towards Public Key Infrastructure less authentication in Session Initiation Protocol
The Session Initiation Protocol (SIP) has become the most predominant protocol for Voice over Internet Protocol (VoIP) signaling. Security of SIP is an important consideration for...
Abdullah Al Hasib, Abdullah Azfar, Md. Sarwar Mors...
SCN
2010
Springer
147views Communications» more  SCN 2010»
14 years 10 months ago
Group Message Authentication
Group signatures is a powerful primitive with many practical applications, allowing a group of parties to share a signature functionality, while protecting the anonymity of the si...
Bartosz Przydatek, Douglas Wikström
SIGMOD
2012
ACM
250views Database» more  SIGMOD 2012»
13 years 1 months ago
Authenticating location-based services without compromising location privacy
The popularity of mobile social networking services (mSNSs) is propelling more and more businesses, especially those in retailing and marketing, into mobile and location-based for...
Haibo Hu, Jianliang Xu, Qian Chen, Ziwei Yang
TON
2010
118views more  TON 2010»
14 years 6 months ago
Multicast Capacity of Wireless Ad Hoc Networks Under Gaussian Channel Model
We study the multicast capacity of large-scale random extended multihop wireless networks, where a number of wireless nodes are randomly located in a square region with side length...
Xiang-Yang Li, Yunhao Liu, Shi Li, ShaoJie Tang