Sciweavers

10044 search results - page 80 / 2009
» Authentication in Wireless Networks
Sort
View
108
Voted
APNOMS
2006
Springer
15 years 7 months ago
An Efficient Authentication and Simplified Certificate Status Management for Personal Area Networks
Abstract. Recently the concept of personal PKI was introduced to describe a public key infrastructure specifically designed to support the distribution of public keys in a personal...
Chul Sur, Kyung Hyune Rhee
125
Voted
ICISC
2001
156views Cryptology» more  ICISC 2001»
15 years 5 months ago
A Distributed Light-Weight Authentication Model for Ad-hoc Networks
Abstract. In this work we present a security model for low-value transactions in ad-hoc networks in which we focus on authentication since this is the core requirement for commerci...
André Weimerskirch, Gilles Thonet
133
Voted
CHES
2000
Springer
86views Cryptology» more  CHES 2000»
15 years 8 months ago
MiniPASS: Authentication and Digital Signatures in a Constrained Environment
Abstract. We describe an implementation of the PASS polynomial authentication and signature scheme [5, 6] that is suitable for use in highly constrained environments such as SmartC...
Jeffrey Hoffstein, Joseph H. Silverman
ESAS
2005
Springer
15 years 9 months ago
Side Channel Attacks on Message Authentication Codes
Katsuyuki Okeya, Tetsu Iwata
156
Voted
ICC
2007
IEEE
136views Communications» more  ICC 2007»
15 years 10 months ago
Cross-layer Networking for Peer Databases over Wireless Ad-Hoc Communities
— Recent advances in wireless technology as well as in electronics industry have given rise to the widespread of wireless ad-hoc networking. Expanding data-centric applications t...
Evangelos Papapetrou, Efthymia Rova, Apostolos Zar...