Sciweavers

858 search results - page 5 / 172
» User Authentication in Sensor Networks
Sort
View
95
Voted
IPSN
2009
Springer
15 years 9 months ago
Secure-TWS: Authenticating node to multi-user communication in shared sensor networks
Leonardo B. Oliveira, Aman Kansal, Bodhi Priyantha...
180
Voted
FGCN
2008
IEEE
197views Communications» more  FGCN 2008»
15 years 9 months ago
Design and Implementation of Hybrid Broadcast Authentication Protocols in Wireless Sensor Networks
The proposed broadcast authentication protocols for wireless sensor networks can be divided into two categories: protocols based on digital signature and protocols based on improv...
Xin Zhao, Xiaodong Wang
99
Voted
ESAS
2007
Springer
15 years 9 months ago
Private Handshakes
—Nowadays, users are increasingly concerned about individual privacy in cyberspace and Internet. In this paper, we propose the concept of private handshakes with optional account...
Jaap-Henk Hoepman
104
Voted
PERCOM
2006
ACM
16 years 2 months ago
Authenticated Query Flooding in Sensor Networks
Abstract. We propose a novel mechanism for authentication of queries in a sensor network in case these queries are flooded. In our protocol, the base station appends an authenticat...
Zinaida Benenson, Lexi Pimenidis, Felix C. Freilin...
123
Voted
ESAS
2005
Springer
15 years 8 months ago
Side Channel Attacks on Message Authentication Codes
Katsuyuki Okeya, Tetsu Iwata