Sciweavers

2108 search results - page 237 / 422
» Encrypted
Sort
View
133
Voted
CCS
2003
ACM
15 years 7 months ago
LEAP: efficient security mechanisms for large-scale distributed sensor networks
We describe LEAP (Localized Encryption and Authentication Protocol), a key management protocol for sensor networks that is designed to support in-network processing, while at the ...
Sencun Zhu, Sanjeev Setia, Sushil Jajodia
SEC
2007
15 years 5 months ago
FirePatch: Secure and Time-Critical Dissemination of Software Patches
Because software security patches contain information about vulnerabilities, they can be reverse engineered into exploits. Tools for doing this already exist. As a result, there is...
Håvard D. Johansen, Dag Johansen, Robbert va...
WICON
2008
15 years 5 months ago
Using the EAP framework for fast media independent handover authentication
In this paper we compare different authentication techniques that may be used in order to reduce the time and resources required to perform a handover: namely, re-authentication a...
Antonio Izquierdo, Nada Golmie, Katrin Hoeper, Lid...
110
Voted
ACSW
2003
15 years 5 months ago
A Secure Mental Poker Protocol Over The Internet
An efficient and secure mental poker scheme is proposed in this paper. It is based on multiple encryption and decryption of individual cards. The protocol satisfies all major sec...
Weiliang Zhao, Vijay Varadharajan, Yi Mu
TNC
2004
96views Education» more  TNC 2004»
15 years 5 months ago
A Roaming Authentication Solution for WiFi Using IPSec VPNs With Client Certificates
Several solutions have been proposed to provide authentication and safe encryption for Wifi networks in order to overcome the limitation of WEP based security. This document descr...
Carlos Ribeiro, Fernando Silva, Andre Zuquete