Sciweavers

287 search results - page 28 / 58
» An Information Security Strategy for Networkable Devices
Sort
View
ESAS
2007
Springer
13 years 12 months ago
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...
Rene Mayrhofer
MOBISYS
2009
ACM
14 years 8 months ago
Attacks on public WLAN-based positioning systems
In this work, we study the security of public WLAN-based positioning systems. Specifically, we investigate the Skyhook positioning system, available on PCs and used on a number of...
Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Chri...
SOUPS
2010
ACM
13 years 12 months ago
Usably secure, low-cost authentication for mobile banking
This paper explores user authentication schemes for banking systems implemented over mobile phone networks in the developing world. We analyze an authentication scheme currently d...
Saurabh Panjwani, Edward Cutrell
SIGCOMM
1998
ACM
14 years 7 days ago
Secure Group Communications Using Key Graphs
Many emerging applications (e.g., teleconference, real-time information services, pay per view, distributed interactive simulation, and collaborative work) are based upon a group ...
Chung Kei Wong, Mohamed G. Gouda, Simon S. Lam
WMTE
2006
IEEE
14 years 2 months ago
Practical Issues in Mobile Education
Practitioners interested in integrating mobile technology effectively into distance learning programs need to consider both the benefits and limitations of such devices. This pape...
Marguerite Koole