Sciweavers

10044 search results - page 80 / 2009
» Authentication in Wireless Networks
Sort
View
106
Voted
APNOMS
2006
Springer
15 years 7 months ago
An Efficient Authentication and Simplified Certificate Status Management for Personal Area Networks
Abstract. Recently the concept of personal PKI was introduced to describe a public key infrastructure specifically designed to support the distribution of public keys in a personal...
Chul Sur, Kyung Hyune Rhee
124
Voted
ICISC
2001
156views Cryptology» more  ICISC 2001»
15 years 5 months ago
A Distributed Light-Weight Authentication Model for Ad-hoc Networks
Abstract. In this work we present a security model for low-value transactions in ad-hoc networks in which we focus on authentication since this is the core requirement for commerci...
André Weimerskirch, Gilles Thonet
131
Voted
CHES
2000
Springer
86views Cryptology» more  CHES 2000»
15 years 8 months ago
MiniPASS: Authentication and Digital Signatures in a Constrained Environment
Abstract. We describe an implementation of the PASS polynomial authentication and signature scheme [5, 6] that is suitable for use in highly constrained environments such as SmartC...
Jeffrey Hoffstein, Joseph H. Silverman
129
Voted
ESAS
2005
Springer
15 years 9 months ago
Side Channel Attacks on Message Authentication Codes
Katsuyuki Okeya, Tetsu Iwata
154
Voted
ICC
2007
IEEE
136views Communications» more  ICC 2007»
15 years 10 months ago
Cross-layer Networking for Peer Databases over Wireless Ad-Hoc Communities
— Recent advances in wireless technology as well as in electronics industry have given rise to the widespread of wireless ad-hoc networking. Expanding data-centric applications t...
Evangelos Papapetrou, Efthymia Rova, Apostolos Zar...