Sciweavers

10044 search results - page 179 / 2009
» Authentication in Wireless Networks
Sort
View
NETWORKING
2004
15 years 5 months ago
Detecting and Blocking Unauthorized Access in Wi-Fi Networks
Abstract. Academic and commercial 802.11 hotspots often use an SSLsecured captive portal to authenticate clients. Captive portals provide good usability and interoperability, but p...
Haidong Xia, José Carlos Brustoloni
CORR
2007
Springer
137views Education» more  CORR 2007»
15 years 4 months ago
Bounds on the Network Coding Capacity for Wireless Random Networks
— Recently, it has been shown that the max flow capacity can be achieved in a multicast network using network coding. In this paper, we propose and analyze a more realistic mode...
Salah A. Aly, Vishal Kapoor, Jie Meng, Andreas Kla...
IWSEC
2009
Springer
15 years 10 months ago
ID-Based Group Password-Authenticated Key Exchange
Abstract—Password-authenticated key exchange (PAKE) protocols are designed to be secure even when the secret key used for authentication is a human-memorable password. In this pa...
Xun Yi, Raylin Tso, Eiji Okamoto
WIS
2004
15 years 5 months ago
Inter-domain Authentication and Authorization Mechanisms for Roaming SIP Users
: To enable users to utilize the services of various providers of multimedia services based on the session initiation protocol (SIP), some kind of interaction is required between t...
Dorgham Sisalem, Jiri Kuthan
CORR
2006
Springer
169views Education» more  CORR 2006»
15 years 4 months ago
Concurrently Non-Malleable Zero Knowledge in the Authenticated Public-Key Model
We consider a type of zero-knowledge protocols that are of interest for their practical applications within networks like the Internet: efficient zero-knowledge arguments of knowl...
Yi Deng, Giovanni Di Crescenzo, Dongdai Lin