Sciweavers

10044 search results - page 47 / 2009
» Authentication in Wireless Networks
Sort
View
OTM
2007
Springer
15 years 5 months ago
Network Coding Protocols for Secret Key Distribution
Abstract. Recent contributions have uncovered the potential of network coding, i.e. algebraic mixing of multiple information flows in a network, to provide enhanced security in pa...
Paulo F. Oliveira, João Barros
WMASH
2004
ACM
15 years 4 months ago
Secure universal mobility for wireless internet
The advent of the mobile wireless Internet has created the need for seamless and secure communication over heterogeneous access networks such as IEEE 802.11, WCDMA, cdma2000, and ...
Ashutosh Dutta, Tao Zhang, Sunil Madhani, Kenichi ...
77
Voted
FC
2004
Springer
94views Cryptology» more  FC 2004»
15 years 4 months ago
The Ephemeral Pairing Problem
Abstract In wireless ad-hoc broadcast networks the pairing problem consists of establishing a (long-term) connection between two specific physical nodes in the network that do not...
Jaap-Henk Hoepman
WICON
2008
15 years 16 days ago
Security challenges in seamless mobility: how to "handover" the keys?
In this paper, we discuss key management challenges for seamless handovers across heterogeneous wireless networks. We focus on utilizing existing keying material from previous acc...
Katrin Hoeper, Lidong Chen, Antonio Izquierdo, Nad...
82
Voted
WS
2005
ACM
15 years 4 months ago
Strengthening EPC tags against cloning
The EPC (Electronic Product Code) tag is a form of RFID (Radio-Frequency IDentification) device that is emerging as a successor to the printed barcode. Like barcodes, EPC tags emi...
Ari Juels