Sciweavers

1482 search results - page 223 / 297
» Wireless LAN Security
Sort
View
ICDCSW
2003
IEEE
15 years 3 months ago
Foundations of Security for Hash Chains in Ad Hoc Networks
Nodes in ad hoc networks generally transmit data at regular intervals over long periods of time. Recently, ad hoc network nodes have been built that run on little power and have v...
Phillip G. Bradford, Olga V. Gavrylyako
TIFS
2011
252views Education» more  TIFS 2011»
14 years 4 months ago
Secure Device Pairing Based on a Visual Channel: Design and Usability Study
— “Pairing” is the establishment of authenticated key agreement between two devices over a wireless channel. Such devices are ad hoc in nature as they lack any common preshar...
Nitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, N...
CORR
2010
Springer
133views Education» more  CORR 2010»
14 years 10 months ago
PSIM: A tool for analysis of device pairing methods
Wireless networks are a common place nowadays and almost all of the modern devices support wireless communication in some form. These networks differ from more traditional computi...
Yasir Arfat Malkani, Lachhman Das Dhomeja
WISEC
2010
ACM
15 years 4 months ago
Automating the injection of believable decoys to detect snooping
We propose a novel trap-based architecture for enterprise networks that detects “silent” attackers who are eavesdropping network traffic. The primary contributions of our work...
Brian M. Bowen, Vasileios P. Kemerlis, Pratap V. P...
WD
2010
14 years 7 months ago
Content Centric Networking in tactical and emergency MANETs
Abstract--Reliable and secure content distribution in a disruptive environment is a critical challenge due to high mobile and lossy channels. Traditional IP networking and wireless...
Soon-Young Oh, Davide Lau, Mario Gerla