Sciweavers

10044 search results - page 63 / 2009
» Authentication in Wireless Networks
Sort
View
112
Voted
TWC
2008
109views more  TWC 2008»
15 years 3 months ago
Using the physical layer for wireless authentication in time-variant channels
Abstract--The wireless medium contains domain-specific information that can be used to complement and enhance traditional security mechanisms. In this paper we propose ways to expl...
Liang Xiao, Larry J. Greenstein, Narayan B. Manday...
131
Voted
ICC
2007
IEEE
143views Communications» more  ICC 2007»
15 years 10 months ago
Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication
Abstract— The wireless medium contains domain-specific information that can be used to complement and enhance traditional security mechanisms. In this paper we propose ways to e...
Liang Xiao, Larry J. Greenstein, Narayan B. Manday...
116
Voted
INFORMATICALT
2008
105views more  INFORMATICALT 2008»
15 years 3 months ago
Public Key Authentication Schemes for Local Area Networks
The invention of public-key cryptography makes many new network applications, such as electronic commerce (CE), possible. However, the widely used Internet is open and unprotected....
Tzungher Chen, Gwoboa Horng, Chuan-Sheng Yang
98
Voted
KIVS
2007
Springer
15 years 9 months ago
A New Model for Public-Key Authentication
Reto Kohlas, Jacek Jonczy, Rolf Haenni
169
Voted
IADIS
2004
15 years 5 months ago
Enhancing WLAN Security by Introducing EAP-TLS Smartcards
Various researches have proposed multiple protocols within 802.11 security to protect and authenticate access to wireless LAN. This paper presents the first implementation of EAP-...
Mohamad Badra, Pascal Urien