Sciweavers

10044 search results - page 66 / 2009
» Authentication in Wireless Networks
Sort
View
CEAS
2008
Springer
15 years 1 months ago
Improving Email Trustworthiness through Social-Group Key Authentication
The increasing use of email for phishing and unsolicited marketing has reduced the trustworthiness of email as a communication medium. Sender authentication is a known defense aga...
Vivek Pathak, Liviu Iftode, Danfeng Yao
PERCOM
2005
ACM
15 years 10 months ago
Security Parallels between People and Pervasive Devices
Unique and challenging security problems arise due to the scarcity of computational, storage, and power resources in the low-cost pervasive computing environment. Particularly rel...
Stephen A. Weis
81
Voted
ITICSE
2009
ACM
15 years 5 months ago
The use of a controlled wireless testbed in courses
Wireless networking has become a popular topic in both undergraduate and graduate courses. However, putting together good assignments in wireless networking is difficult because t...
Peter Steenkiste
APNOMS
2007
Springer
15 years 5 months ago
Integrated OTP-Based User Authentication and Access Control Scheme in Home Networks
In this paper, we propose a new user authentication (UA) scheme based on one-time password (OTP) protocol for home networks. The proposed scheme is to authenticate home users ident...
Jongpil Jeong, Min Young Chung, Hyunseung Choo
WICON
2008
15 years 18 days ago
Security vulnerabilities in IEEE 802.22
Cognitive Radio (CR) is seen as one of the enabling technologies for realizing a new spectrum access paradigm, viz. Opportunistic Spectrum Sharing (OSS). IEEE 802.22 is the world&...
Kaigui Bian, Jung Min Park