Sciweavers

10044 search results - page 157 / 2009
» Authentication in Wireless Networks
Sort
View
GLOBECOM
2009
IEEE
15 years 6 months ago
QOMB: A Wireless Network Emulation Testbed
—In this paper we present QOMB, a testbed we designed and implemented for the evaluation of wireless network systems, protocols and applications. The testbed uses the wireless ne...
Razvan Beuran, Lan Tien Nguyen, Toshiyuki Miyachi,...
WCNC
2010
IEEE
15 years 3 months ago
Node Connectivity Analysis in Multi-Hop Wireless Networks
—In this paper, we study node connectivity in multi-hop wireless networks. Nodal degree of connectivity as one of the fundamental graph properties is the basis for the study of n...
Bahador Bakhshi, Siavash Khorsandi
IEEEARES
2006
IEEE
15 years 5 months ago
A Reference Model for Authentication and Authorisation Infrastructures Respecting Privacy and Flexibility in b2c eCommerce
Authentication and Authorisation Infrastructures (AAIs) are gaining momentum throughout the Internet. Solutions have been proposed for various scenarios among them academia, GRID ...
Christian Schläger, Thomas Nowey, José...
ACNS
2004
Springer
156views Cryptology» more  ACNS 2004»
15 years 5 months ago
One-Round Protocols for Two-Party Authenticated Key Exchange
Cryptographic protocol design in a two-party setting has often ignored the possibility of simultaneous message transmission by each of the two parties (i.e., using a duplex channe...
Ik Rae Jeong, Jonathan Katz, Dong Hoon Lee
PADL
2001
Springer
15 years 4 months ago
Specifying Authentication Protocols Using Rewriting and Strategies
Abstract. Programming with rewrite rules and strategies has been already used for describing several computational logics. This paper describes the way the Needham-Schroeder Public...
Horatiu Cirstea