Sciweavers

1150 search results - page 50 / 230
» Beacon Based Authentication
Sort
View
CANS
2008
Springer
159views Cryptology» more  CANS 2008»
13 years 10 months ago
Anonymous and Transparent Gateway-Based Password-Authenticated Key Exchange
ded abstract of this paper appeared in Proceedings of the 7th International Conference on Cryptology and Network Security (CANS '08) December 2
Michel Abdalla, Malika Izabachène, David Po...
ICWN
2003
13 years 10 months ago
Ad Hoc Network Authentication: A Jini-Based Approach
D. M. Needham, M. M. McMahon, J. B. Datko
ASIAN
2009
Springer
284views Algorithms» more  ASIAN 2009»
13 years 10 months ago
A Simulation-Based Treatment of Authenticated Message Exchange
Klaas Ole Kürtz, Henning Schnoor, Thomas Wilk...
CEE
2010
66views more  CEE 2010»
13 years 9 months ago
Enhancements of authenticated multiple key exchange protocol based on bilinear pairings
Duc-Liem Vo, Hyunrok Lee, Chan-Yeob Yeun, Kwangjo ...
CORR
2010
Springer
125views Education» more  CORR 2010»
13 years 9 months ago
Comments on Five Smart Card Based Password Authentication Protocols
Yalin Chen, Jue-Sam Chou, Chun-Hui Huang