Sciweavers

10044 search results - page 93 / 2009
» Authentication in Wireless Networks
Sort
View
WSNA
2003
ACM
15 years 4 months ago
Fast authenticated key establishment protocols for self-organizing sensor networks
In this paper, we consider efficient authenticated key This work may not be copied or reproduced in whole or in part for any commercial purpose. Permission to copy in whole or in...
Qiang Huang, Johnas Cukier, Hisashi Kobayashi, Bed...
ICB
2007
Springer
124views Biometrics» more  ICB 2007»
15 years 5 months ago
Face Authentication with Salient Local Features and Static Bayesian Network
In this paper, the problem of face authentication using salient facial features together with statistical generative models is adressed. Actually, classical generative models, and ...
Guillaume Heusch, Sébastien Marcel
ICWS
2003
IEEE
15 years 19 days ago
A Stateless Network Architecture for Inter-Enterprise Authentication, Authorization and Accounting
Abstract Providing network infrastructure for authentication, authorization and accounting (AAA) functionalities required by inter-enterprise business applications operating over t...
H. T. Kung, F. Zhu, M. Iansiti
NETWORKING
2004
15 years 19 days ago
Efficient, Authenticated, and Fault-Tolerant Key Agreement for Dynamic Peer Groups
We present an efficient authenticated and fault-tolerant protocol (AFTD) for tree-based key agreement. Our approach is driven by the insight that when a Diffie-Hellman blinded key ...
Li Zhou, Chinya V. Ravishankar
ICCSA
2009
Springer
15 years 6 months ago
On a Construction of Short Digests for Authenticating Ad Hoc Networks
In pervasive ad-hoc networks, there is a need for devices to be able to communicate securely, despite the lack of apriori shared security associations and the absence of an infrast...
Khoongming Khoo, Ford-Long Wong, Chu-Wee Lim