Sciweavers

10044 search results - page 78 / 2009
» Authentication in Wireless Networks
Sort
View
CCS
1998
ACM
15 years 3 months ago
Authenticated Group Key Agreement and Friends
Many modern computing environments involve dynamic peer groups. Distributed simulation, multi-user games, conferencing and replicated servers are just a few examples. Given the op...
Giuseppe Ateniese, Michael Steiner, Gene Tsudik
INFOCOM
2012
IEEE
13 years 9 months ago
Expected loss bounds for authentication in constrained channels
We derive bounds on the expected loss for authentication protocols in channels which are constrained due to noisy conditions and communication costs. This is motivated by a numbe...
Christos Dimitrakakis, Aikaterini Mitrokotsa, Serg...
EUROPKI
2004
Springer
15 years 4 months ago
Using EMV Cards for Single Sign-On
Abstract. At present, network users have to manage a set of authentication credentials (usually a username/password pair) for every service with which they are registered. Single S...
Andreas Pashalidis, Chris J. Mitchell
PAM
2005
Springer
15 years 4 months ago
Application, Network and Link Layer Measurements of Streaming Video over a Wireless Campus Network
The growth of wireless LANs has brought the expectation for high-bitrate streaming video to wireless PCs. However, it remains unknown how to best adapt video to wireless channel ch...
Feng Li, Jae Chung, Mingzhe Li, Huahui Wu, Mark Cl...
IPSN
2009
Springer
15 years 6 months ago
Secure-TWS: Authenticating node to multi-user communication in shared sensor networks
Leonardo B. Oliveira, Aman Kansal, Bodhi Priyantha...