Sciweavers

10044 search results - page 83 / 2009
» Authentication in Wireless Networks
Sort
View
161
Voted
ICB
2009
Springer
156views Biometrics» more  ICB 2009»
15 years 1 months ago
Efficient Biometric Verification in Encrypted Domain
Biometric authentication over public networks leads to a variety of privacy issues that needs to be addressed before it can become popular. The primary concerns are that the biomet...
Maneesh Upmanyu, Anoop M. Namboodiri, K. Srinathan...
132
Voted
SAINT
2003
IEEE
15 years 9 months ago
Distributed Authentication for Peer-to-Peer Networks
A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Securi...
Shardul Gokhale, Partha Dasgupta
115
Voted
PERCOM
2007
ACM
16 years 3 months ago
Tork: A Variable-Hop Overlay for Heterogeneous Networks
Alan Brown, John F. Buford, Mario Kolberg
118
Voted
MOBIHOC
2008
ACM
16 years 3 months ago
Challenging benchmark for location discovery in ad hoc networks: foundations and applications
Davood Shamsi, Farinaz Koushanfar, Miodrag Potkonj...