Sciweavers

279 search results - page 3 / 56
» Authentication Protocols for Personal Communication Systems
Sort
View
WPES
2004
ACM
14 years 14 days ago
Off-the-record communication, or, why not to use PGP
Quite often on the Internet, cryptography is used to protect private, personal communications. However, most commonly, systems such as PGP are used, which use long-lived encryptio...
Nikita Borisov, Ian Goldberg, Eric A. Brewer
ICC
2008
IEEE
14 years 1 months ago
Using Personal Electronic Device for Authentication-Based Service Access
Abstract—A person usually carries multiple authentication tokens in the form of various cards to access services electronically. Often the service outlets are equipped with a str...
Abhishek Gaurav, Ankit Sharma, Vikas Gelara, Rajat...
SPAA
2010
ACM
13 years 12 months ago
Securing every bit: authenticated broadcast in radio networks
This paper studies non-cryptographic authenticated broadcast in radio networks subject to malicious failures. We introduce two protocols that address this problem. The first, Nei...
Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zark...
CSREASAM
2009
13 years 4 months ago
A Secure Certificate for Secure Group Communication
- Security is a primary concern in group communication, and secure authentication is essential to establishing a secure group communication. Most conventional authentications consi...
Sunghyuck Hong
ICISC
1998
99views Cryptology» more  ICISC 1998»
13 years 8 months ago
Public key protocols for wireless communications
Abstract. Protocols for authentication and key establishment have special requirements in a wireless environment. In the next generation of wireless systems it is likely that publi...
Colin Boyd, DongGook Park