Sciweavers

10044 search results - page 2 / 2009
» Authentication in Wireless Networks
Sort
View
78
Voted
CSREASAM
2006
15 years 10 days ago
A New Secure Authentication Scheme Based Threshold ECDSA For Wireless Sensor Network
- Security is an important issue for Wireless Sensor Network (WSN), especially for security-sensitive application. In this paper, we address secure authentication problems in WSN. ...
Hao Wang, Zhongfu Wu, Xin Tan
73
Voted
ISCAS
2006
IEEE
100views Hardware» more  ISCAS 2006»
15 years 5 months ago
Unequal authenticity protection (UAP) for rate-distortion-optimized secure streaming of multimedia over wireless networks
— This paper presents a new notion of authenticating degraded multimedia content streamed over wireless networks – Unequal Authenticity Protection (UAP). Multimedia content dif...
Zhi Li, Qibin Sun, Yong Lian
148
Voted
FGCN
2008
IEEE
197views Communications» more  FGCN 2008»
15 years 5 months ago
Design and Implementation of Hybrid Broadcast Authentication Protocols in Wireless Sensor Networks
The proposed broadcast authentication protocols for wireless sensor networks can be divided into two categories: protocols based on digital signature and protocols based on improv...
Xin Zhao, Xiaodong Wang
94
Voted
IJNSEC
2008
127views more  IJNSEC 2008»
14 years 11 months ago
Reducing Communication Overhead for Wireless Roaming Authentication: Methods and Performance Evaluation
The protocol design for wireless roaming authentication is challenging because of the key management regarding users and home/visited networks. In this paper, we present two authe...
Men Long, Chwan-Hwa John Wu, J. David Irwin
92
Voted
APNOMS
2009
Springer
15 years 5 months ago
A PKI Based Mesh Router Authentication Scheme to Protect from Malicious Node in Wireless Mesh Network
Wireless mesh network can increase service coverage by low-cost multiple-paths between a source and a destination. But because of the wireless nature, wireless mesh network is vuln...
Kwang Hyun Lee, Choong Seon Hong