Sciweavers

10044 search results - page 97 / 2009
» Authentication in Wireless Networks
Sort
View
SP
2002
IEEE
14 years 11 months ago
Expander Graphs for Digital Stream Authentication and Robust Overlay Networks
Dawn Xiaodong Song, J. D. Tygar, David Zuckerman
COMCOM
2010
92views more  COMCOM 2010»
14 years 9 months ago
A secure and efficient SIP authentication scheme for converged VoIP networks
Eun-Jun Yoon, Kee-Young Yoo, Cheonshik Kim, YouSik...
SACI
2007
IEEE
15 years 5 months ago
Implementation of an Authentication Protocol for Sending Audio-Video Information in Java
— an application for assuring the authenticity of audio-video information is developed. The application is implemented in Java by using Java Media Framework to send audio and vid...
Bogdan Groza, Dorina Petrica, Simona Barbu, Marian...
ICCSA
2005
Springer
15 years 4 months ago
Attacks on Port Knocking Authentication Mechanism
Abstract. Research in authentication mechanisms has led to the design and development of new schemes. The security provided by these procedures must be reviewed and analyzed before...
Antonio Izquierdo Manzanares, Joaquín Torre...