Sciweavers

3482 search results - page 238 / 697
» Designing for security
Sort
View
WMASH
2003
ACM
14 years 2 months ago
Secure authentication system for public WLAN roaming
A serious challenge for seamless roaming between independent wireless LANs (WLANs) is how best to confederate the various WLAN service providers, each having different trust relat...
Yasuhiko Matsunaga, Ana Sanz Merino, Takashi Suzuk...
ICICS
2003
Springer
14 years 2 months ago
Security Remarks on a Group Signature Scheme with Member Deletion
A group signature scheme allows a group member of a given group to sign messages on behalf of the group in an anonymous and unlinkable fashion. In case of a dispute, however, a des...
Guilin Wang, Feng Bao, Jianying Zhou, Robert H. De...
CRYPTO
1999
Springer
159views Cryptology» more  CRYPTO 1999»
14 years 1 months ago
UMAC: Fast and Secure Message Authentication
We describe a message authentication algorithm, UMAC, which can authenticate messages (in software, on contemporary machines) roughly an order of magnitude faster than current prac...
John Black, Shai Halevi, Hugo Krawczyk, Ted Krovet...
EUROCRYPT
2000
Springer
14 years 1 months ago
Authenticated Key Exchange Secure against Dictionary Attacks
Password-based protocols for authenticated key exchange (AKE) are designed to work despite the use of passwords drawn from a space so small that an adversary might well enumerate, ...
Mihir Bellare, David Pointcheval, Phillip Rogaway
OPODIS
2004
13 years 11 months ago
Secure Location Verification Using Radio Broadcast
Secure location verification is a recently stated problem that has a number of practical applications. The problem requires a wireless sensor network to confirm that a potentially...
Adnan Vora, Mikhail Nesterenko