Sciweavers

10044 search results - page 53 / 2009
» Authentication in Wireless Networks
Sort
View
SPW
2004
Springer
15 years 4 months ago
Authentication Components: Engineering Experiences and Guidelines
abstract February 6, 2004 Security protocols typically employ an authentication phase followed by a protected data exchange. In some cases, such TLS, these two phases are tightly ...
Pasi Eronen, Jari Arkko
IJNSEC
2007
126views more  IJNSEC 2007»
14 years 11 months ago
Elliptic Curve Cryptography Based Wireless Authentication Protocol
Recently, Aydos et al. proposed an ECC-based wireless authentication protocol. Because their protocol is based on ECC, the protocol has significant advantage including lower comp...
Yongliang Liu, Wen Gao, Hongxun Yao, Xinghua Yu
CASES
2010
ACM
14 years 9 months ago
Low cost multicast authentication via validity voting in time-triggered embedded control networks
Wired embedded networks must include multicast authentication to prevent masquerade attacks within the network. However, unique constraints for these networks make most existing m...
Christopher Szilagyi, Philip Koopman
GI
2003
Springer
15 years 4 months ago
Two-Factor Web Authentication Via Voice
: The increasing pressure for network accessible information and business applications demands secure, interoperable, cost efficient and user self-service authentication procedures...
Jörg Tacke, Andreas Wolf
IJNSEC
2006
113views more  IJNSEC 2006»
14 years 11 months ago
Cryptanalysis of Park's Authentication Protocol in Wireless Mobile Communication Systems
In 2004, C. Park proposed an authentication protocol to provide user anonymity and untraceability in wireless mobile communication systems. The real user identities are hidden and...
Alberto Peinado Domínguez