Sciweavers

858 search results - page 64 / 172
» User Authentication in Sensor Networks
Sort
View
CCS
2009
ACM
15 years 2 months ago
TruWallet: trustworthy and migratable wallet-based web authentication
Identity theft has fostered to a major security problem on the Internet, in particular stealing passwords for web applications through phishing and malware. We present TruWallet, ...
Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadegh...
WCE
2007
14 years 11 months ago
Information Fusion for Hazard Analysis in Multi-Sensor Systems based on Bayesian Networks
—Modern sliding table saws are equipped with several passive safety devices. However, alone in Germany several hundred severe injuries or limb amputations occur each year due dis...
Jörg Barrho, Johannes Hauger, Uwe Kiencke
ESAS
2004
Springer
15 years 3 months ago
Public Key Cryptography in Sensor Networks - Revisited
The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless...
Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar
COMCOM
2007
95views more  COMCOM 2007»
14 years 10 months ago
Key management for long-lived sensor networks in hostile environments
Large-scale wireless sensor networks (WSNs) are highly vulnerable to attacks because they consist of numerous resource-constrained devices and communicate via wireless links. Thes...
Michael Chorzempa, Jung Min Park, Mohamed Eltoweis...
FC
2007
Springer
125views Cryptology» more  FC 2007»
15 years 4 months ago
Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups
Task-specific groups are often formed in an ad-hoc manner within big structures, like companies. Take the following typical scenario: A high rank manager decides that a task force...
Yvo Desmedt, Tanja Lange, Mike Burmester