Sciweavers

10044 search results - page 79 / 2009
» Authentication in Wireless Networks
Sort
View
INTERACT
2003
15 years 17 days ago
Managing Multiple Passwords and Multiple Logins: MiFA
Internet users today who subscribe to many different accounts or subscriptions online face a bewildering array of logins and passwords to remember on security systems where usabil...
Bo Lu, Michael Twidale
TWC
2008
155views more  TWC 2008»
14 years 11 months ago
Redefinition of max-min fairness in multi-hop wireless networks
In this paper, it is shown that it is challenging to evaluate service fairness in multi-hop wireless networks due to intra-flow contention and unequal channel capacity. The convent...
Ping Wang, Hai Jiang, Weihua Zhuang, H. Vincent Po...
SOSP
2003
ACM
15 years 8 months ago
Decentralized user authentication in a global file system
The challenge for user authentication in a global file system is allowing people to grant access to specific users and groups in remote administrative domains, without assuming ...
Michael Kaminsky, George Savvides, David Mazi&egra...
AINA
2005
IEEE
15 years 4 months ago
An Improved Low Computation Cost User Authentication Scheme for Mobile Communication
Most of existing user authentication schemes require high computation cost of exponentiation operations for the purpose of security. However, it is not suitable for mobile devices...
Chia-Yin Lee, Chu-Hsing Lin, Chin-Chen Chang
CQRE
1999
Springer
15 years 3 months ago
Cryptanalysis of Microsoft's PPTP Authentication Extensions (MS-CHAPv2)
The Point-to-Point Tunneling Protocol (PPTP) is used to secure PPP connections over TCP/IP link. In response to [SM98], Microsoft released extensions to the PPTP authentication me...
Bruce Schneier, Mudge, David Wagner