Sciweavers

10044 search results - page 133 / 2009
» Authentication in Wireless Networks
Sort
View
117
Voted
EUROMICRO
2006
IEEE
15 years 9 months ago
Towards Ethernet-Based Wireless Mesh Networks for Fast Moving Users
In this paper we examine the capabilities of Switched Ethernet for building wireless mesh networks (WMNs) and more specific for the support of fast moving users. We will motivate...
Filip De Greve, Wim Vandenberghe, Filip De Turck, ...
133
Voted
WCE
2007
15 years 4 months ago
System Design and Networking Protocols for Wireless Positioning
Abstract—The recent boom in wireless communications has led to a wide range of new applications. Wireless positioning is an emerging technology which can provide accurate locatio...
Bo Peng, Andrew H. Kemp, Washington Ochieng
120
Voted
TNC
2004
96views Education» more  TNC 2004»
15 years 5 months ago
A Roaming Authentication Solution for WiFi Using IPSec VPNs With Client Certificates
Several solutions have been proposed to provide authentication and safe encryption for Wifi networks in order to overcome the limitation of WEP based security. This document descr...
Carlos Ribeiro, Fernando Silva, Andre Zuquete
140
Voted
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
15 years 10 months ago
PPAA: Peer-to-Peer Anonymous Authentication
In the pursuit of authentication schemes that balance user privacy and accountability, numerous anonymous credential systems have been constructed. However, existing systems assume...
Patrick P. Tsang, Sean W. Smith
137
Voted
AINA
2007
IEEE
15 years 7 months ago
Verifying Identifier-Authenticity in Ubiquitous Computing Environment
In ubiquitous computing environment, identification of objects and places in the real world is important, and 2-D printing code is useful to store identifiers of them. However, si...
Tetsuo Kamina, Toshinori Aoki, Yoshiteru Eto, Nobo...