Sciweavers

10044 search results - page 58 / 2009
» Authentication in Wireless Networks
Sort
View
CANS
2009
Springer
126views Cryptology» more  CANS 2009»
15 years 5 months ago
Ensuring Authentication of Digital Information Using Cryptographic Accumulators
In this paper, we study the broadcast authentication problem for both erasure and adversarial networks. Two important concerns for authentication protocols are the authentication ...
Christophe Tartary
KIVS
2007
Springer
15 years 5 months ago
A Proof of Concept Implementation of SSL/TLS Session-Aware User Authentication (TLS-SA)
Abstract Most SSL/TLS-based e-commerce applications employ conventional mechanisms for user authentication. These mechanisms—if decoupled from SSL/TLS session establishment—are...
Rolf Oppliger, Ralf Hauser, David A. Basin, Aldo R...
GI
2004
Springer
15 years 4 months ago
A Low-Cost Solution for Frequent Symmetric Key Exchange in Ad-hoc Networks
: Next to authentication, secure key exchange is considered the most critical and complex issue regarding ad-hoc network security. We present a low-cost, (i.e. low hardware-complex...
Markus Volkmer, Sebastian Wallner

Lecture Notes
456views
16 years 9 months ago
Wireless and Mobile Networking
The lecture notes cover the following topics, CSE 574S Wireless and Mobile Networking: Course Overview, Wireless Networking Trends, A Review of Key Wireless Physical Layer Co...
Raj Jain