Classic security systems use a trust model centered in the authentication procedure, which depends on a naming service. Even when using a Public Key Infrastructure as X.509, such s...
Altair Olivo Santin, Joni da Silva Fraga, Carlos M...
In this paper an agri-food traceability system based on public key cryptography and Radio Frequency Identification (RFID) technology is proposed. In order to guarantee safety in f...
Paolo Bernardi, Claudio Demartini, Filippo Gandino...
Abstract—In Wireless Sensor Networks (WSNs), authentication is a crucial security requirement to avoid attacks against secure communication, and to mitigate DoS attacks exploitin...
Recently several researchers and practitioners have begun to address the problem of how to set up secure communication between two devices without the assistance of a trusted thir...
Nitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, N...
Despite the advantages offered by pure Peer-to-Peer (P2P) networks (e.g. robustness and fault tolerance), a crucial requirement is to guarantee basic security properties, such as ...