Various researches have proposed multiple protocols within 802.11 security to protect and authenticate access to wireless LAN. This paper presents the first implementation of EAP-...
Even though PDAs in general—but smartcards in particular—can be trusted to keep secrets, because they have meager resources, including them in security protocols is difficult...
We introduce a technique for using an untrusted device, such as a hand-held personal digital assistant or a laptop to perform real nancial transactions without a network. We utili...
We describe the implementation of the Shoup-Rubin key distribution protocol. This protocol stores long-term keys on a smartcard and uses the cryptographic capability of the card t...
Rob Jerdonek, Peter Honeyman, Kevin Coffman, Jim R...