Sciweavers

3088 search results - page 93 / 618
» Multichannel Security Protocols
Sort
View
122
Voted
CCS
2005
ACM
15 years 8 months ago
Deciding security of protocols against off-line guessing attacks
We provide an effective procedure for deciding the existence of off-line guessing attacks on security protocols, for a bounded number of sessions. The procedure consists of a co...
Mathieu Baudet
ICNP
2002
IEEE
15 years 7 months ago
A Secure Routing Protocol for Ad Hoc Networks
Most recent ad hoc network research has focused on providing routing services without considering security. In this paper, we detail security threats against ad hoc routing protoc...
Kimaya Sanzgiri, Bridget Dahill, Brian Neil Levine...
143
Voted
JCM
2008
121views more  JCM 2008»
15 years 2 months ago
A Cooperative Secure Routing Protocol based on Reputation System for Ad Hoc Networks
In wireless ad hoc networks, all its nodes behave as routers and take part in its discovery and maintenance of routes to other nodes. Thus, the presence of selfish or malicious nod...
Yihui Zhang, Li Xu, Xiaoding Wang
126
Voted
WINET
2002
101views more  WINET 2002»
15 years 2 months ago
SPINS: Security Protocols for Sensor Networks
As sensor networks edge closer towards wide-spread deployment, security issues become a central concern. So far, much research has focused on making sensor networks feasible and u...
Adrian Perrig, Robert Szewczyk, J. D. Tygar, Victo...
77
Voted
ICB
2007
Springer
135views Biometrics» more  ICB 2007»
15 years 8 months ago
Feeling Is Believing: A Secure Template Exchange Protocol
We use grip pattern based biometrics as a secure side channel to achieve pre-authentication in a protocol that sets up a secure channel between two hand held devices. The protocol ...
Ileana Buhan, Jeroen Doumen, Pieter H. Hartel, Ray...