Sciweavers

10044 search results - page 133 / 2009
» Authentication in Wireless Networks
Sort
View
EUROMICRO
2006
IEEE
15 years 5 months ago
Towards Ethernet-Based Wireless Mesh Networks for Fast Moving Users
In this paper we examine the capabilities of Switched Ethernet for building wireless mesh networks (WMNs) and more specific for the support of fast moving users. We will motivate...
Filip De Greve, Wim Vandenberghe, Filip De Turck, ...
WCE
2007
15 years 21 days ago
System Design and Networking Protocols for Wireless Positioning
Abstract—The recent boom in wireless communications has led to a wide range of new applications. Wireless positioning is an emerging technology which can provide accurate locatio...
Bo Peng, Andrew H. Kemp, Washington Ochieng
TNC
2004
96views Education» more  TNC 2004»
15 years 27 days ago
A Roaming Authentication Solution for WiFi Using IPSec VPNs With Client Certificates
Several solutions have been proposed to provide authentication and safe encryption for Wifi networks in order to overcome the limitation of WEP based security. This document descr...
Carlos Ribeiro, Fernando Silva, Andre Zuquete
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
15 years 5 months ago
PPAA: Peer-to-Peer Anonymous Authentication
In the pursuit of authentication schemes that balance user privacy and accountability, numerous anonymous credential systems have been constructed. However, existing systems assume...
Patrick P. Tsang, Sean W. Smith
AINA
2007
IEEE
15 years 3 months ago
Verifying Identifier-Authenticity in Ubiquitous Computing Environment
In ubiquitous computing environment, identification of objects and places in the real world is important, and 2-D printing code is useful to store identifiers of them. However, si...
Tetsuo Kamina, Toshinori Aoki, Yoshiteru Eto, Nobo...