Sciweavers

10044 search results - page 43 / 2009
» Authentication in Wireless Networks
Sort
View
WS
2004
ACM
15 years 4 months ago
A man-in-the-middle attack on UMTS
In this paper we present a man-in-the-middle attack on the Universal Mobile Telecommunication Standard (UMTS), one of the newly emerging 3G mobile technologies. The attack allows ...
Ulrike Meyer, Susanne Wetzel
EWSN
2006
Springer
15 years 10 months ago
Algorithms for Wireless Sensor Networks
Roger Wattenhofer
95
Voted
ISPA
2007
Springer
15 years 5 months ago
A Secure Energy-Efficient Routing Protocol for WSN
The intent of this paper is to propose an energy-efficient routing protocol with data transmission security for wireless sensor networks. We create an energy and distance aware sin...
Al-Sakib Khan Pathan, Choong Seon Hong
JSS
2006
65views more  JSS 2006»
14 years 11 months ago
Cryptanalysis of a hybrid authentication protocol for large mobile networks
In this paper we analyse a hybrid authentication protocol due to Chien and Jan, designed for use in large mobile networks. The proposed protocol consists of two sub-protocols, nam...
Qiang Tang, Chris J. Mitchell
IEEEARES
2006
IEEE
15 years 5 months ago
Mitigating Denial of Service Threats in GSM Networks
–Mobile networks not only provide great benefits to their users but they also introduce inherent security issues. With respect to security, the emerging risks of denial of servic...
Valer Bocan, Vladimir Cretu