Sciweavers

253 search results - page 7 / 51
» Distributed Authentication for Peer-to-Peer Networks
Sort
View
PKC
2004
Springer
160views Cryptology» more  PKC 2004»
15 years 2 months ago
Constant Round Authenticated Group Key Agreement via Distributed Computation
Abstract. A group key agreement protocol allows a set of users, communicating over a public network, to agree on a private session key. Most of the schemes proposed so far require ...
Emmanuel Bresson, Dario Catalano
68
Voted
ICDCS
1993
IEEE
15 years 1 months ago
Proxy-Based Authorization and Accounting for Distributed Systems
Despite recent widespread interest in the secure authentication of principals across computer networks there has been considerably less discussion of distributed mechanisms to sup...
B. Clifford Neuman
105
Voted
WOWMOM
2009
ACM
151views Multimedia» more  WOWMOM 2009»
15 years 4 months ago
Distributed user authentication in wireless LANs
—An increasing number of mobile devices, including smartphones, use WLAN for accessing the Internet. Existing WLAN authentication mechanisms are either disruptive, such as presen...
Dmitriy Kuptsov, Andrey Khurri, Andrei Gurtov
MIDDLEWARE
2005
Springer
15 years 3 months ago
A new two-message authentication protocol for RFID sensor networks
Ê Ó Ö ÕÙ Ò Ý Á ÒØ Ø ÓÒ ´Ê Á µ Ø ÒÓÐÓ Ý × Ñ ¹ Ø Ó ØÓ Ö ÑÓØ ÐÝ ×ØÓÖ Ò Ö ØÖ Ú Ø Ù× Ò ×Ñ ÐÐ Ñ ¹ ÖÓ Ô ÐÐ Ø Ê Á Ø ...
Selma Boumerdassi, Papa Kane Diop, Éric Ren...
ICOIN
2005
Springer
15 years 3 months ago
A Self-organized Authentication Architecture in Mobile Ad-Hoc Networks
Abstract. Network security is considered one of the obstacles that prevent the wide deployment of ad-hoc wireless networks. Among many security problems, authentication is the most...
Seongil Hahm, Yongjae Jung, Seunghee Yi, Yukyoung ...