Sciweavers

91 search results - page 9 / 19
» Efficient Provider Authentication for Bidirectional Broadcas...
Sort
View
SENSYS
2006
ACM
15 years 3 months ago
RBP: robust broadcast propagation in wireless networks
Varying interference levels make broadcasting an unreliable operation in low-power wireless networks. Many routing and resource discovery protocols depend on flooding (repeated pe...
Fred Stann, John S. Heidemann, Rajesh Shroff, Muha...
CCS
2006
ACM
15 years 1 months ago
Fortifying password authentication in integrated healthcare delivery systems
Integrated Delivery Systems (IDSs) now become a primary means of care provision in healthcare domain. However, existing password systems (under either the single-server model or t...
Yanjiang Yang, Robert H. Deng, Feng Bao
DBSEC
2006
134views Database» more  DBSEC 2006»
14 years 10 months ago
Notarized Federated Identity Management for Web Services
We propose a notarized federated identity management model that supports efficient user authentication when providers are unknown to each other. Our model introduces a notary servi...
Michael T. Goodrich, Roberto Tamassia, Danfeng Yao
COMCOM
2007
149views more  COMCOM 2007»
14 years 9 months ago
Adaptive security design with malicious node detection in cluster-based sensor networks
Distributed wireless sensor networks have problems on detecting and preventing malicious nodes, which always bring destructive threats and compromise multiple sensor nodes. Theref...
Meng-Yen Hsieh, Yueh-Min Huang, Han-Chieh Chao
PIMRC
2008
IEEE
15 years 3 months ago
AuthScan: Enabling fast handoff across already deployed IEEE 802.11 wireless networks
Abstract—Handoff procedure in IEEE 802.11 wireless networks must be accomplished with as little interruption as possible to maintain the required quality of service (QoS). We hav...
Jaeouk Ok, Pedro Morales, Hiroyuki Morikawa