Sciweavers

1259 search results - page 46 / 252
» An Efficient Mobile Authentication Scheme for Wireless Netwo...
Sort
View
IJISEC
2010
150views more  IJISEC 2010»
13 years 5 months ago
Efficient online/offline identity-based signature for wireless sensor network
In this paper, we present an online/offline identity-based signature scheme for the wireless sensor network (WSN). We argue that due to significant reduction in costs of computati...
Joseph K. Liu, Joonsang Baek, Jianying Zhou, Yanji...
CIIT
2007
161views Communications» more  CIIT 2007»
13 years 9 months ago
Using a two-timer scheme to detect selfish nodes in mobile ad-hoc networks
The cooperation of wireless nodes in ad hoc networks is crucial to ensure the proper working of the whole network due to the absence of infrastructure. Misbehaving nodes can drama...
H. Lui, José G. Delgado-Frias, Sirisha Medi...
ICUIMC
2009
ACM
14 years 2 months ago
Bilinear-pairing-based remote user authentication schemes using smart cards
This paper presents a detailed review of remote user authentication schemes with smart cards based on bilinear pairings. The first scheme regarding this was proposed by Manik et a...
Al-Sakib Khan Pathan, Choong Seon Hong
CANS
2009
Springer
160views Cryptology» more  CANS 2009»
14 years 2 months ago
Short Hash-Based Signatures for Wireless Sensor Networks
We present a hash-based signature scheme customized for wireless sensor networks. For message lengths required by instructions or queries from the base station or single measuremen...
Erik Dahmen, Christoph Krauß
ICNP
2007
IEEE
14 years 2 months ago
Cooperation Between Stations in Wireless Networks
Abstract— In a wireless network, mobile nodes (MNs) repeatedly perform tasks such as layer 2 (L2) handoff, layer 3 (L3) handoff and authentication. These tasks are critical, part...
Andrea G. Forte, Henning Schulzrinne