Sciweavers

1150 search results - page 11 / 230
» Beacon Based Authentication
Sort
View
CRYPTO
2005
Springer
113views Cryptology» more  CRYPTO 2005»
14 years 1 months ago
Secure Communications over Insecure Channels Based on Short Authenticated Strings
Abstract. We propose a way to establish peer-to-peer authenticated communications over an insecure channel by using an extra channel which can authenticate very short strings, e.g....
Serge Vaudenay
IEEEARES
2007
IEEE
14 years 1 months ago
On the use of one-way chain based authentication protocols in secure control systems
The use of one-way chains in authentication protocols is a technique of great importance which has many applications. Employing cryptographic techniques in the area of industrial ...
Bogdan Groza, Toma-Leonida Dragomir
ACNS
2003
Springer
123views Cryptology» more  ACNS 2003»
14 years 21 days ago
Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards
Abstract. The use of biometrics, and fingerprint recognition in particular, for cardholder authentication in smartcard systems is growing in popularity, and such systems are the f...
Luciano Rila, Chris J. Mitchell
INFORMATICALT
2010
132views more  INFORMATICALT 2010»
13 years 4 months ago
An Improved Securer and Efficient Nonce-Based Authentication Scheme with Token-Update
In this paper, we propose a mutual authentication scheme using nonce variable instead of Mac address and accompanying with token updates to improve the functionality. Lee et al. (2...
Chiu-Hsiung Liao, Ching-Te Wang, Hon-Chan Chen
INFOCOM
2006
IEEE
14 years 1 months ago
Learn on the Fly: Data-Driven Link Estimation and Routing in Sensor Network Backbones
— In the context of IEEE 802.11b network testbeds, we examine the differences between unicast and broadcast link properties, and we show the inherent difficulties in precisely e...
Hongwei Zhang, Anish Arora, Prasun Sinha