In this paper, we analyze a one-way hash chain based authentication scheme proposed by Haddad and Krishnan. The authentication scheme has been introduced for improving handover per...
The vulnerable air interface, device level constraints, and insecure encryption techniques of wireless networks have naturally increased the chance of attacker obtaining users inf...
Abstract. Small, mobile devices without user interfaces, such as Bluetooth headsets, often need to communicate securely over wireless networks. Active attacks can only be prevented...
- Security is an important issue for Wireless Sensor Network (WSN), especially for security-sensitive application. In this paper, we address secure authentication problems in WSN. ...
The paper describes the design of FAME (Flexible Access Middleware Extension) architecture aimed at providing multi-level user authentication service for Shibboleth, which is endo...
Aleksandra Nenadic, Ning Zhang, Jay Chin, Carole A...