Sciweavers

10044 search results - page 21 / 2009
» Authentication in Wireless Networks
Sort
View
144
Voted
IPPS
2007
IEEE
15 years 10 months ago
Authentication in Reprogramming of Sensor Networks for Mote Class Adversaries
Reprogramming is an essential service for wireless sensor networks. Authenticating reprogramming process is important as sensors need to verify that the code image is truly from a...
Limin Wang, Sandeep S. Kulkarni
159
Voted
WOWMOM
2009
ACM
151views Multimedia» more  WOWMOM 2009»
15 years 10 months ago
Distributed user authentication in wireless LANs
—An increasing number of mobile devices, including smartphones, use WLAN for accessing the Internet. Existing WLAN authentication mechanisms are either disruptive, such as presen...
Dmitriy Kuptsov, Andrey Khurri, Andrei Gurtov
140
Voted
BROADNETS
2005
IEEE
15 years 9 months ago
Measuring performance impact of security protocols in wireless local area networks
- In this paper, we study and quantify the impact of the most widely used security protocols, such as 802.1x, EAP, IPSEC, SSL and RADIUS, in wireless local area networks (WLANs). B...
Avesh Kumar Agarwal, Wenye Wang
112
Voted
SIGCOMM
1995
ACM
15 years 7 months ago
Authentication Protocols for Personal Communication Systems
Masquerading and eavesdropping are major threats to the security of wireless communications. To provide proper protection for the communication of the wireless link, contents of t...
Hung-Yu Lin, Lein Harn
135
Voted
ICOIN
2007
Springer
15 years 9 months ago
An Efficient Authentication Procedure for Fast Handoff in Mobile IPv6 Networks
 Mobile IP (MIP) has been paid a lot of attention as a good candidate  to provide such global mobility among heterogeneous networks.  And, IPv6  incorporat...
Jun-Won Lee, Sang-Won Min, Byung K. Choi