Sciweavers

10044 search results - page 78 / 2009
» Authentication in Wireless Networks
Sort
View
147
Voted
CCS
1998
ACM
15 years 8 months ago
Authenticated Group Key Agreement and Friends
Many modern computing environments involve dynamic peer groups. Distributed simulation, multi-user games, conferencing and replicated servers are just a few examples. Given the op...
Giuseppe Ateniese, Michael Steiner, Gene Tsudik
285
Voted
INFOCOM
2012
IEEE
14 years 2 months ago
Expected loss bounds for authentication in constrained channels
We derive bounds on the expected loss for authentication protocols in channels which are constrained due to noisy conditions and communication costs. This is motivated by a numbe...
Christos Dimitrakakis, Aikaterini Mitrokotsa, Serg...
125
Voted
EUROPKI
2004
Springer
15 years 9 months ago
Using EMV Cards for Single Sign-On
Abstract. At present, network users have to manage a set of authentication credentials (usually a username/password pair) for every service with which they are registered. Single S...
Andreas Pashalidis, Chris J. Mitchell
155
Voted
PAM
2005
Springer
15 years 9 months ago
Application, Network and Link Layer Measurements of Streaming Video over a Wireless Campus Network
The growth of wireless LANs has brought the expectation for high-bitrate streaming video to wireless PCs. However, it remains unknown how to best adapt video to wireless channel ch...
Feng Li, Jae Chung, Mingzhe Li, Huahui Wu, Mark Cl...
104
Voted
IPSN
2009
Springer
15 years 10 months ago
Secure-TWS: Authenticating node to multi-user communication in shared sensor networks
Leonardo B. Oliveira, Aman Kansal, Bodhi Priyantha...