Sciweavers

1116 search results - page 55 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
ITCC
2005
IEEE
14 years 1 months ago
A Lightweight Authentication Protocol for Mobile Ad Hoc Networks
The characteristics of mobile ad hoc networks (MANETs) determine that the authentication approaches to protect routing and data packet transmission in MANETs should be lightweight...
Bin Lu, Udo W. Pooch
WS
2004
ACM
14 years 1 months ago
A man-in-the-middle attack on UMTS
In this paper we present a man-in-the-middle attack on the Universal Mobile Telecommunication Standard (UMTS), one of the newly emerging 3G mobile technologies. The attack allows ...
Ulrike Meyer, Susanne Wetzel
EUROPKI
2004
Springer
14 years 1 months ago
Threshold Password-Based Authentication Using Bilinear Pairings
We present a new threshold password-based authentication protocol that allows a roaming user(a user who accesses a network from different client terminals) to download a private k...
Songwon Lee, Kyusuk Han, Seok-kyu Kang, Kwangjo Ki...
IJAMC
2008
84views more  IJAMC 2008»
13 years 8 months ago
Towards an authentication service for Peer-to-Peer based Massively Multiuser Virtual Environments
Abstract-- In this paper we propose a distributed authentication service for peer-to-peer (P2P) based massively multiuser virtual environments. Such a service is necessary to provi...
Arno Wacker, Gregor Schiele, Sebastian Schuster, T...
SCN
2008
Springer
106views Communications» more  SCN 2008»
13 years 8 months ago
A bilateral remote user authentication scheme that preserves user anonymity
Smart card-based authentication is one of the most widely used and practical solutions to remote user authentication. Compared to other authentication schemes, our proposed scheme...
Huei-Ru Tseng, Rong-Hong Jan, Wuu Yang