Sciweavers

10044 search results - page 64 / 2009
» Authentication in Wireless Networks
Sort
View
121
Voted
PERCOM
2009
ACM
16 years 4 months ago
Caveat Emptor: A Comparative Study of Secure Device Pairing Methods
Abstract--"Secure Device Pairing" is the process of bootstrapping a secure channel between two previously unassociated devices over a (usually wireless) human-imperceptib...
Arun Kumar, Nitesh Saxena, Gene Tsudik, Ersin Uzun
82
Voted
ACSAC
2000
IEEE
15 years 8 months ago
An High-Speed ECC-based Wireless Authentication Protocol on an ARM Microprocessor
Murat Aydos, T. Yanik, Çetin Kaya Koç...
132
Voted
HUC
2010
Springer
15 years 4 months ago
Groupthink: usability of secure group association for wireless devices
A fairly common modern setting entails users, each in possession of a personal wireless device, wanting to communicate securely, via their devices. If these users (and their devic...
Rishab Nithyanand, Nitesh Saxena, Gene Tsudik, Ers...
125
Voted
MOBIHOC
2009
ACM
16 years 4 months ago
Secure multidimensional range queries in sensor networks
Most future large-scale sensor networks are expected to follow a two-tier architecture which consists of resource-rich master nodes at the upper tier and resource-poor sensor node...
Rui Zhang, Jing Shi, Yanchao Zhang
132
Voted
ICSNC
2007
IEEE
15 years 10 months ago
Using the mobile phone as a security token for unified authentication
- The number of different identities and credentials used for authentication towards services on the Internet has increased beyond the manageable. Still, the most common authentica...
Steffen Hallsteinsen, Ivar Jørstad, Do Van ...