Sciweavers

609 search results - page 35 / 122
» One-Time-Password-Authenticated Key Exchange
Sort
View
TIFS
2010
184views more  TIFS 2010»
15 years 9 days ago
Information-theoretically secret key generation for fading wireless channels
—The multipath-rich wireless environment associated with typical wireless usage scenarios is characterized by a fading channel response that is time-varying, location-sensitive, ...
Chunxuan Ye, Suhas Mathur, Alex Reznik, Yogendra S...
FC
2004
Springer
94views Cryptology» more  FC 2004»
15 years 7 months ago
The Ephemeral Pairing Problem
Abstract In wireless ad-hoc broadcast networks the pairing problem consists of establishing a (long-term) connection between two specific physical nodes in the network that do not...
Jaap-Henk Hoepman
CORR
2010
Springer
83views Education» more  CORR 2010»
15 years 1 months ago
A Platform for Implementing Secure Wireless Ad Hoc Networks
: We propose a new platform for implementing secure wireless ad hoc networks. Our proposal is based on a modular architecture, with the software stack constructed directly on the E...
Gyula Farkas, Béla Genge, Piroska Haller
CORR
2010
Springer
124views Education» more  CORR 2010»
15 years 2 months ago
Quantum Three-Pass protocol: Key distribution using quantum superposition states
This letter proposes a novel key distribution protocol with no key exchange in advance, which is secure as the BB84 quantum key distribution protocol. Our protocol utilizes a phot...
Yoshito Kanamori, Seong-Moo Yoo
ICC
2007
IEEE
119views Communications» more  ICC 2007»
15 years 8 months ago
A Secure Authentication Policy for UMTS and WLAN Interworking
—We propose a security authentication policy, Dynamic Session Key Policy (DSKP), for a secure handoff between the UMTS and IEEE 802.11 WLAN. This policy is founded and improved f...
Yen-Chieh Ouyang, Chang-Bu Jang, Hung-Ta Chen