Sciweavers

10044 search results - page 8 / 2009
» Authentication in Wireless Networks
Sort
View
GI
2005
Springer
14 years 3 months ago
A new approach towards authenticated key agreement schemes for resource-constrained devices
: This paper describes a novel solution for authenticated key agreement for wireless sensor networks (WSN) in logistics. The retrieved data may not be spoofed as it is used to gene...
Christian Gorecki, Christian Behrens, Rainer Laur
SUTC
2008
IEEE
14 years 4 months ago
Inter-domain Authentication for Seamless Roaming in Heterogeneous Wireless Networks
Summit R. Tuladhar, Carlos E. Caicedo, James B. D....
IJSN
2008
90views more  IJSN 2008»
13 years 9 months ago
A novel localised authentication scheme in IEEE 802.11 based Wireless Mesh Networks
: In the paper, we propose an efficient two-factor localised authentication scheme for inter-domain handover and roaming in IEEE 802.11 based service-oriented wireless mesh network...
Xiaodong Lin, Xinhua Ling, Haojin Zhu, Pin-Han Ho,...
ESAS
2007
Springer
14 years 1 months ago
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...
Rene Mayrhofer
IWNAS
2008
IEEE
14 years 4 months ago
Event-based Trust Framework Model in Wireless Sensor Networks
The security of wireless sensor networks is ever more important nowadays. Most of the proposed security protocols in wireless sensor networks are based on authentication and encry...
Haiguang Chen, Huafeng Wu, Jinchu Hu, Chuanshan Ga...