Sciweavers

1656 search results - page 110 / 332
» Secure Computation Without Authentication
Sort
View
105
Voted
IJNSEC
2007
145views more  IJNSEC 2007»
15 years 17 days ago
Authenticated Group Key Agreement Protocols for Ad hoc Wireless Networks
The lack of fixed infrastructure, both physical and organizational, and the highly dynamic nature of ad hoc networks, presents a major challenge in providing secure, authenticate...
Ahmed Abdel-Hafez, Ali Miri, Luis Orozco-Barbosa
120
Voted
LCN
2006
IEEE
15 years 6 months ago
Privacy-Preserving Quick Authentication in Fast Roaming Networks
Vehicular networks will become an important component for information accesses in one’s daily life. A vehicular network provides a vehicular user not only chances to communicate...
Jun Liu, Xiaoyan Hong, Qunwei Zheng, Lei Tang
89
Voted
OZCHI
2006
ACM
15 years 6 months ago
Question-based group authentication
There are various situations where a distinction needs to be made between group members and outsiders. For example, to protect students in chat groups from unpleasant incidents ca...
Ann Nosseir, Richard C. H. Connor, Karen Renaud
126
Voted
SIGOPS
1998
123views more  SIGOPS 1998»
15 years 9 days ago
A New Family of Authentication Protocols
Abstract. We present a related family of authentication and digital signature protocols based on symmetric cryptographic primitives which perform substantially better than previous...
Ross J. Anderson, Francesco Bergadano, Bruno Crisp...
138
Voted
IWNAS
2008
IEEE
15 years 7 months ago
Event-based Trust Framework Model in Wireless Sensor Networks
The security of wireless sensor networks is ever more important nowadays. Most of the proposed security protocols in wireless sensor networks are based on authentication and encry...
Haiguang Chen, Huafeng Wu, Jinchu Hu, Chuanshan Ga...