Sciweavers

72 search results - page 5 / 15
» A User Study Design for Comparing the Security of Registrati...
Sort
View
IACR
2011
221views more  IACR 2011»
12 years 7 months ago
A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions
Abstract. Radio Frequency Identification (RFID) systems are vulnerable to relay attacks (i.e., mafia, terrorist and distance frauds) when they are used for authentication purpose...
Süleyman Kardas, Mehmet Sabir Kiraz, Muhammed...
MHCI
2009
Springer
14 years 1 months ago
User evaluation of lightweight user authentication with a single tri-axis accelerometer
We report a series of user studies that evaluate the feasibility and usability of light-weight user authentication with a single tri-axis accelerometer. We base our investigation ...
Jiayang Liu, Lin Zhong, Jehan Wickramasuriya, Venu...
SECON
2008
IEEE
14 years 1 months ago
A Multi-AP Architecture for High-Density WLANs: Protocol Design and Experimental Evaluation
—Fast proliferation of IEEE 802.11 wireless devices has led to the emergence of High-Density (HD) Wireless Local Area Networks (WLANs), where it is challenging to improve the thr...
Yanfeng Zhu, Zhisheng Niu, Qian Zhang, Bo Tan, Zhi...
EUROCRYPT
2004
Springer
13 years 11 months ago
Anonymous Identification in Ad Hoc Groups
We introduce Ad Hoc Anonymous Identification schemes, a new multi-user cryptographic primitive that allows participants from a user population to form ad hoc groups, and then prove...
Yevgeniy Dodis, Aggelos Kiayias, Antonio Nicolosi,...
JNW
2006
85views more  JNW 2006»
13 years 7 months ago
Seamless Handoff Solution For Nested Mobile Networks
Ensuring seamless mobility for users is becoming one of the main objectives of ongoing research activities in the field of data telecommunications. More over, if some proposals are...
Mehdi Sabeur, Badii Jouaber, Djamal Zeghlache