Sciweavers

10044 search results - page 80 / 2009
» Authentication in Wireless Networks
Sort
View
APNOMS
2006
Springer
15 years 3 months ago
An Efficient Authentication and Simplified Certificate Status Management for Personal Area Networks
Abstract. Recently the concept of personal PKI was introduced to describe a public key infrastructure specifically designed to support the distribution of public keys in a personal...
Chul Sur, Kyung Hyune Rhee
ICISC
2001
156views Cryptology» more  ICISC 2001»
15 years 18 days ago
A Distributed Light-Weight Authentication Model for Ad-hoc Networks
Abstract. In this work we present a security model for low-value transactions in ad-hoc networks in which we focus on authentication since this is the core requirement for commerci...
André Weimerskirch, Gilles Thonet
CHES
2000
Springer
86views Cryptology» more  CHES 2000»
15 years 3 months ago
MiniPASS: Authentication and Digital Signatures in a Constrained Environment
Abstract. We describe an implementation of the PASS polynomial authentication and signature scheme [5, 6] that is suitable for use in highly constrained environments such as SmartC...
Jeffrey Hoffstein, Joseph H. Silverman
ESAS
2005
Springer
15 years 4 months ago
Side Channel Attacks on Message Authentication Codes
Katsuyuki Okeya, Tetsu Iwata
ICC
2007
IEEE
136views Communications» more  ICC 2007»
15 years 5 months ago
Cross-layer Networking for Peer Databases over Wireless Ad-Hoc Communities
— Recent advances in wireless technology as well as in electronics industry have given rise to the widespread of wireless ad-hoc networking. Expanding data-centric applications t...
Evangelos Papapetrou, Efthymia Rova, Apostolos Zar...