Sciweavers

95 search results - page 4 / 19
» Authenticated Access to Reserved Network Resources
Sort
View
ADHOC
2006
95views more  ADHOC 2006»
13 years 7 months ago
LHAP: A lightweight network access control protocol for ad hoc networks
Most ad hoc networks do not implement any network access control, leaving these networks vulnerable to resource consumption attacks where a malicious node injects packets into the ...
Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jaj...
ADHOC
2007
109views more  ADHOC 2007»
13 years 7 months ago
Access control in wireless sensor networks
Nodes in a sensor network may be lost due to power exhaustion or malicious attacks. To extend the lifetime of the sensor network, new node deployment is necessary. In military sce...
Yun Zhou, Yanchao Zhang, Yuguang Fang
ICDCSW
2003
IEEE
14 years 21 days ago
LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks
Most ad hoc networks do not implement any network access control, leaving these networks vulnerable to resource consumption attacks where a malicious node injects packets into the...
Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jaj...
CHI
2003
ACM
14 years 20 days ago
ShownPass: an easy access control with a displayed password
Access control is one of the most important issue with ubiquitous networking environment. Traditional access control methods are mainly considering authentication of registered us...
Yuji Ayatsuka, Michimune Kohno, Jun Rekimoto
FGCS
2000
131views more  FGCS 2000»
13 years 7 months ago
Keystroke dynamics as a biometric for authentication
More than ever before the Internet is changing computing as we know it. Global access to information and resources is becoming an integral part of nearly every aspect of our lives...
Fabian Monrose, Aviel D. Rubin