Sciweavers

1150 search results - page 34 / 230
» Beacon Based Authentication
Sort
View
WS
2004
ACM
14 years 29 days ago
Analysis of the 802.11i 4-way handshake
802.11i is an IEEE standard designed to provide enhanced MAC security in wireless networks. The authentication process involves three entities: the supplicant (wireless device), t...
Changhua He, John C. Mitchell
EUROPKI
2004
Springer
14 years 28 days ago
Using EMV Cards for Single Sign-On
Abstract. At present, network users have to manage a set of authentication credentials (usually a username/password pair) for every service with which they are registered. Single S...
Andreas Pashalidis, Chris J. Mitchell
SOSP
2003
ACM
14 years 4 months ago
Decentralized user authentication in a global file system
The challenge for user authentication in a global file system is allowing people to grant access to specific users and groups in remote administrative domains, without assuming ...
Michael Kaminsky, George Savvides, David Mazi&egra...
ICIAP
2003
ACM
14 years 7 months ago
Multimodal biometric authentication using quality signals in mobile communications
The elements of multimodal authentication along with system models are presented. These include the machine experts as well as machine supervisors. In particular fingerprint and s...
Josef Bigün, Julian Fiérrez-Aguilar, J...
PIMRC
2008
IEEE
14 years 1 months ago
Cooperative handoff in wireless networks
—In 802.11-based wireless networks the stations (STAs) are associated with the available access points (APs) and communicate through them. In traditional handoff schemes the STAs...
George Athanasiou, Thanasis Korakis, Leandros Tass...