Sciweavers

10044 search results - page 68 / 2009
» Authentication in Wireless Networks
Sort
View
CTRSA
2006
Springer
140views Cryptology» more  CTRSA 2006»
15 years 2 months ago
Session Corruption Attack and Improvements on Encryption Based MT-Authenticators
Bellare, Canetti and Krawczyk proposed a security model (BCK-model) for authentication and key exchange protocols in 1998. The model not only reasonably captures the power of pract...
Xiaojian Tian, Duncan S. Wong
AINA
2004
IEEE
15 years 2 months ago
Using IC Cards to Remotely Login Passwords without Verification Tables
A new remote password authentication scheme based on IC cards is proposed in this paper. By using the scheme, a remote password can be authenticated without either a password file...
Ching-Te Wang, Chin-Chen Chang, Chu-Hsing Lin
CONEXT
2006
ACM
15 years 5 months ago
Investigating the user mobility in wireless mobile networks through real measurements
In this paper is proposed a real mobility characterization study for wireless devices. For this, we use mobility metrics and statistic analysis to evaluate the behavior of device ...
Carlos Alberto V. Campos, Luís Felipe M. de...
HICSS
2008
IEEE
211views Biometrics» more  HICSS 2008»
15 years 5 months ago
Integrated OTP-Based User Authentication Scheme Using Smart Cards in Home Networks
—In this paper, we propose a new user authentication (UA) scheme based on one-time password (OTP) protocol using smart cards for home networks. The proposed scheme is to authenti...
Jongpil Jeong, Min Young Chung, Hyunseung Choo
MMNS
2003
69views Multimedia» more  MMNS 2003»
15 years 16 days ago
Authentication Issues in Multi-service Residential Access Networks
Abstract. Multi-service residential access networks allow residential customers to choose amongst a variety of service offerings, over a range of Core Networks and subject to user...
Judith E. Y. Rossebø, John Ronan, Kristian ...