Sciweavers

1101 search results - page 180 / 221
» On the Security and Vulnerability of PING
Sort
View
EUC
2008
Springer
14 years 11 months ago
An Improved Password-Based Authenticated Key Agreement Scheme for Pervasive Applications
Password authentication is a popular approach used for user authentication in pervasive computing environments due to its simplicity and convenience. To secure the transmission be...
Maw-Jinn Tsaur, Wei-Chi Ku, Hao-Rung Chung
IM
2003
14 years 11 months ago
Firewall Policy Advisor for Anomaly Discovery and Rule Editing
Abstract: Firewalls are core elements in network security. However, managing firewall rules, especially for enterprize networks, has become complex and error-prone. Firewall filt...
Ehab S. Al-Shaer, Hazem H. Hamed
ESORICS
2010
Springer
14 years 10 months ago
On E-Vote Integrity in the Case of Malicious Voter Computers
Norway has started to implement e-voting (over the Internet, and by using voters' own computers) within the next few years. The vulnerability of voter's computers was ide...
Sven Heiberg, Helger Lipmaa, Filip van Laenen
WISEC
2010
ACM
14 years 10 months ago
Attacks on physical-layer identification
Physical-layer identification of wireless devices, commonly referred to as Radio Frequency (RF) fingerprinting, is the process of identifying a device based on transmission imperf...
Boris Danev, Heinrich Luecken, Srdjan Capkun, Kari...
ADT
2010
14 years 9 months ago
An EAP-EHash authentication method adapted to resource constrained terminals
: In the era of mobile and wireless networks, the growing complexity of end devices and the accentuated tendency towards miniaturization of them raise new security challenges. Auth...
Omar Cheikhrouhou, Maryline Laurent, Amin Ben Abda...