Sciweavers

10044 search results - page 132 / 2009
» Authentication in Wireless Networks
Sort
View
DSN
2003
IEEE
15 years 4 months ago
From Crash Tolerance to Authenticated Byzantine Tolerance: A Structured Approach, the Cost and Benefits
Many fault-tolerant group communication middleware systems have been implemented assuming crash failure semantics. While this assumption is not unreasonable, it becomes hard to ju...
Dimane Mpoeleng, Paul D. Ezhilchelvan, Neil A. Spe...
NDSS
2002
IEEE
15 years 4 months ago
Advanced Client/Server Authentication in TLS
Many business transactions on the Internet occur between strangers, that is, between entities with no prior relationship and no common security domain. Traditional security approa...
Adam Hess, Jared Jacobson, Hyrum Mills, Ryan Wamsl...
CCS
2006
ACM
15 years 3 months ago
Deniable authentication and key exchange
We extend the definitional work of Dwork, Naor and Sahai from deniable authentication to deniable key-exchange protocols. We then use these definitions to prove the deniability fe...
Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk
CSREASAM
2006
15 years 28 days ago
Data Security and wireless networks: mutually exclusive?
- The increased use and popularity of wireless networks has seen their adoption in medical information systems. They provide the advantages of mobility and instant information avai...
Andrew Woodward
93
Voted
ACSC
2007
IEEE
15 years 5 months ago
Architecture of a Web Accelerator For Wireless Networks
With the continuous growth of mobile users and web-based wireless applications, the performance of accessing web services via wireless is becoming one of the key issues. Regular T...
Jian Song, Yanchun Zhang