Sciweavers

10044 search results - page 152 / 2009
» Authentication in Wireless Networks
Sort
View
TII
2010
139views Education» more  TII 2010»
14 years 6 months ago
The Impact of Temperature on Outdoor Industrial WSN Applications
The industrial world is currently considering the adoption of Wireless Sensor Networks (WSN) for industrial process and control applications. However, when using wireless sensor n...
Carlo Alberto Boano, James Brown, Nicolas Tsiftes,...
CTRSA
2010
Springer
169views Cryptology» more  CTRSA 2010»
15 years 6 months ago
Hash Function Combiners in TLS and SSL
Abstract. The TLS and SSL protocols are widely used to ensure secure communication over an untrusted network. Therein, a client and server first engage in the so-called handshake ...
Marc Fischlin, Anja Lehmann, Daniel Wagner
SOUPS
2006
ACM
15 years 5 months ago
Protecting domestic power-line communications
– In this paper we describe the protection goals and mechanisms in HomePlug AV, a next-generation power-line communications standard. This is a fascinating case-history in securi...
Richard E. Newman, Sherman Gavette, Larry Yonge, R...
ETFA
2005
IEEE
15 years 5 months ago
A security architecture for data privacy and security
Data access and software exchange are often achieved over insecure networks such as the public Internet. System designers are therefore forced to be proactive with regard to verif...
Alfred C. Weaver
ACISP
2003
Springer
15 years 5 months ago
A Taxonomy of Single Sign-On Systems
Abstract. At present, network users have to manage one set of authentication credentials (usually a username/password pair) for every service with which they are registered. Single...
Andreas Pashalidis, Chris J. Mitchell