Sciweavers

10044 search results - page 145 / 2009
» Authentication in Wireless Networks
Sort
View
156
Voted
PKC
2004
Springer
160views Cryptology» more  PKC 2004»
15 years 9 months ago
Constant Round Authenticated Group Key Agreement via Distributed Computation
Abstract. A group key agreement protocol allows a set of users, communicating over a public network, to agree on a private session key. Most of the schemes proposed so far require ...
Emmanuel Bresson, Dario Catalano
119
Voted
DSOM
2003
Springer
15 years 9 months ago
MobiMan: Bringing Scripted Agents to Wireless Terminal Management
The increasing software complexity of wireless devices and wireless data service provisioning motivates a wireless terminal management challenge. The systems management solution fo...
Venu Vasudevan, Sandeep Adwankar, Nitya Narasimhan
144
Voted
NDSS
2003
IEEE
15 years 9 months ago
Proactive Two-Party Signatures for User Authentication
We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two parties—the client and the serverâ...
Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis...
153
Voted
SP
2010
IEEE
156views Security Privacy» more  SP 2010»
15 years 1 months ago
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes
Abstract--We consider resource-constrained broadcast authentication for n receivers in a static, known network topology. There are only two known broadcast authentication protocols...
Haowen Chan, Adrian Perrig
134
Voted
ICDCN
2010
Springer
15 years 10 months ago
Authenticated Byzantine Generals in Dual Failure Model
Pease et al. introduced the problem of Byzantine Generals (BGP) to study the effects of Byzantine faults in distributed protocols for reliable broadcast. It is well known that BG...
Anuj Gupta, Prasant Gopal, Piyush Bansal, Kannan S...