Sciweavers

10044 search results - page 131 / 2009
» Authentication in Wireless Networks
Sort
View
IJNSEC
2011
77views more  IJNSEC 2011»
14 years 6 months ago
Performance Evaluation of the TSS Node Authentication Scheme in Noisy MANETs
This paper presents a description and performance evaluation of a threshold secret sharing (TSS) node authentication scheme in noisy mobile ad hoc networks (MANETs). The scheme ca...
Hussein Al-Bahadili, Shakir Hussain, Ghassan Issa,...
BROADNETS
2005
IEEE
15 years 5 months ago
Privacy enhanced access control in pervasive computing environments
Abstract— Privacy and security are two important but seemingly contradict objectives in pervasive computing environments (PCEs). On the one hand, service providers want to authen...
Kui Ren, Wenjing Lou

Publication
152views
15 years 2 months ago
Expected loss analysis of thresholded authentication protocols in noisy conditions
A number of authentication protocols have been proposed recently, where at least some part of the authentication is performed during a phase, lasting $n$ rounds, with no error corr...
Christos Dimitrakakis, Aikaterini Mitrokotsa, Serg...
CMS
2010
118views Communications» more  CMS 2010»
14 years 11 months ago
SIP Proxies: New Reflectors in the Internet
To mitigate identity theft in SIP networks, an inter-domain authentication mechanism based on certificates is proposed in RFC 4474 [10]. Unfortunately, the design of the certificat...
Ge Zhang, Jordi Jaen Pallares, Yacine Rebahi, Simo...
BROADNETS
2005
IEEE
15 years 5 months ago
Wireless enhancements for storage area networks
— We propose the creation of a wireless storage area network (SAN) and analyze its benefits. The proposed wireless SAN (WSAN) consists of a SAN switch that is connected to multi...
David W. Griffith, Kotikalapudi Sriram, JingSi Gao...