Sciweavers

1482 search results - page 203 / 297
» Wireless LAN Security
Sort
View
KI
2008
Springer
15 years 1 months ago
Monitoring Movement Behavior by Means of a Large Area Proximity Sensor Array in the Floor
This paper describes an innovative sensor system which can detect and track people in a room by means of an array of capacitive sensors beneath the floor covering. By combining cut...
Axel Steinhage, Christl Lauterbach
NDSS
2005
IEEE
15 years 7 months ago
Security Analysis and Improvements for IEEE 802.11i
This paper analyzes the IEEE 802.11i wireless networking standard with respect to data confidentiality, integrity, mutual authentication, and availability. Under our threat model,...
Changhua He, John C. Mitchell
PERVASIVE
2007
Springer
15 years 7 months ago
Shake Well Before Use: Authentication Based on Accelerometer Data
Abstract. Small, mobile devices without user interfaces, such as Bluetooth headsets, often need to communicate securely over wireless networks. Active attacks can only be prevented...
Rene Mayrhofer, Hans Gellersen
CRITIS
2006
15 years 5 months ago
Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios
It is commonly agreed that Wireless Sensor Networks (WSN) is one of the technologies that better fulfills features like the ones required by Critical (Information) Infrastructures....
Cristina Alcaraz, Rodrigo Roman
IACR
2011
192views more  IACR 2011»
14 years 1 months ago
The Hummingbird-2 Lightweight Authenticated Encryption Algorithm
Hummingbird-2 is an encryption algorithm with a 128-bit secret key and a 64-bit initialization vector. Hummingbird-2 optionally produces an authentication tag for each message proc...
Daniel Engels, Markku-Juhani O. Saarinen, Peter Sc...