In grid environment, there are many administrative domains, each domain has its own CA, and entities in different domains need authentication when accessing each other. The OCSP (...
—The paper studies the problem of securely storing biometric passwords, such as fingerprints and irises. With the help of coding theory Juels and Wattenberg derived in 1999 a sc...
The paper presents the performance advantage of Wireless Token Ring Protocol (WTRP) versus IEEE 802.11 in DCF mode. WTRP is a medium access control (MAC) protocol and is designed ...
Mustafa Ergen, Duke Lee, Raja Sengupta, Pravin Var...
—Wireless Ad hoc networks represent a powerful telecommunication infrastructure that is being exploited for enabling general wireless networking connectivity for a variety of sig...
Kerberos is a distributed authentication system that many organizations use to handle domain-wide password security. Although it has been known for quite some time that Kerberos i...