Sciweavers

122 search results - page 11 / 25
» An improved deniable authentication protocol
Sort
View
IJNSEC
2007
121views more  IJNSEC 2007»
13 years 6 months ago
Injecting Heterogeneity Through Protocol Randomization
In this paper, we argue that heterogeneity should be an important principle in design and use of cryptographic protocols. We use automated formal analysis tools to randomly genera...
Li Zhuang, J. D. Tygar, Rachna Dhamija
WS
2004
ACM
14 years 4 days ago
Analysis of the 802.11i 4-way handshake
802.11i is an IEEE standard designed to provide enhanced MAC security in wireless networks. The authentication process involves three entities: the supplicant (wireless device), t...
Changhua He, John C. Mitchell
CASES
2010
ACM
13 years 4 months ago
Low cost multicast authentication via validity voting in time-triggered embedded control networks
Wired embedded networks must include multicast authentication to prevent masquerade attacks within the network. However, unique constraints for these networks make most existing m...
Christopher Szilagyi, Philip Koopman
IJSN
2010
148views more  IJSN 2010»
13 years 5 months ago
Authentication and secret search mechanisms for RFID-aware wireless sensor networks
: This paper investigates authentication and secure data retrieval issues in Radio-Frequency IDentification (RFID)-aware wireless sensor networks. We propose a network architecture...
Shih-I Huang, Shiuhpyng Shieh
ICMCS
2005
IEEE
296views Multimedia» more  ICMCS 2005»
14 years 9 days ago
An Association-Based Graphical Password Design Resistant to Shoulder-Surfing Attack
In line with the recent call for technology on Image Based Authentication (IBA) in JPEG committee [1], we present a novel graphical password design in this paper. It rests on the ...
Zhi Li, Qibin Sun, Yong Lian, Daniele D. Giusto