Sciweavers

1150 search results - page 26 / 230
» Beacon Based Authentication
Sort
View
103
Voted
ACNS
2004
Springer
104views Cryptology» more  ACNS 2004»
15 years 7 months ago
Key Agreement Using Statically Keyed Authenticators
A family of authenticators based on static shared keys is identified and proven secure. The authenticators can be used in a variety of settings, including identity-based ones. App...
Colin Boyd, Wenbo Mao, Kenneth G. Paterson
103
Voted
CCS
1999
ACM
15 years 6 months ago
Proof-Carrying Authentication
We have designed and implemented a general and powerful distributed authentication framework based on higher-order logic. Authentication frameworks — including Taos, SPKI, SDSI,...
Andrew W. Appel, Edward W. Felten
IJNSEC
2008
115views more  IJNSEC 2008»
15 years 2 months ago
A Simple User Authentication Scheme for Grid Computing
The security issue has become an important concern of grid computing. To prevent the grid resources from being illegally visited, the strong mutual authentication is needed for us...
Rongxing Lu, Zhenfu Cao, Zhenchuan Chai, Xiaohui L...
APNOMS
2009
Springer
15 years 9 months ago
A PKI Based Mesh Router Authentication Scheme to Protect from Malicious Node in Wireless Mesh Network
Wireless mesh network can increase service coverage by low-cost multiple-paths between a source and a destination. But because of the wireless nature, wireless mesh network is vuln...
Kwang Hyun Lee, Choong Seon Hong
108
Voted
ICMCS
2005
IEEE
106views Multimedia» more  ICMCS 2005»
15 years 8 months ago
Watermarking based Image Authentication using Feature Amplification
In a typical content and watermarking based image authentication approach, a feature is extracted from the given image, and then embedded back into the image using a watermarking ...
Shuiming Ye, Ee-Chien Chang, Qibin Sun