Sciweavers

10044 search results - page 63 / 2009
» Authentication in Wireless Networks
Sort
View
TWC
2008
109views more  TWC 2008»
14 years 11 months ago
Using the physical layer for wireless authentication in time-variant channels
Abstract--The wireless medium contains domain-specific information that can be used to complement and enhance traditional security mechanisms. In this paper we propose ways to expl...
Liang Xiao, Larry J. Greenstein, Narayan B. Manday...
ICC
2007
IEEE
143views Communications» more  ICC 2007»
15 years 5 months ago
Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication
Abstract— The wireless medium contains domain-specific information that can be used to complement and enhance traditional security mechanisms. In this paper we propose ways to e...
Liang Xiao, Larry J. Greenstein, Narayan B. Manday...
INFORMATICALT
2008
105views more  INFORMATICALT 2008»
14 years 11 months ago
Public Key Authentication Schemes for Local Area Networks
The invention of public-key cryptography makes many new network applications, such as electronic commerce (CE), possible. However, the widely used Internet is open and unprotected....
Tzungher Chen, Gwoboa Horng, Chuan-Sheng Yang
KIVS
2007
Springer
15 years 5 months ago
A New Model for Public-Key Authentication
Reto Kohlas, Jacek Jonczy, Rolf Haenni
IADIS
2004
15 years 17 days ago
Enhancing WLAN Security by Introducing EAP-TLS Smartcards
Various researches have proposed multiple protocols within 802.11 security to protect and authenticate access to wireless LAN. This paper presents the first implementation of EAP-...
Mohamad Badra, Pascal Urien