Sciweavers

255 search results - page 25 / 51
» Principles for Entity Authentication
Sort
View
ESAS
2007
Springer
14 years 2 months ago
Distance Bounding in Noisy Environments
Location information can be used to enhance mutual entity authentication protocols in wireless ad-hoc networks. More specifically, distance bounding protocols have been introduced...
Dave Singelée, Bart Preneel
SKG
2006
IEEE
14 years 2 months ago
An Extended OCSP Protocol for Grid CA Cross-certification
In grid environment, there are many administrative domains, each domain has its own CA, and entities in different domains need authentication when accessing each other. The OCSP (...
Shaomin Zhang, Huitao Gong, Baoyi Wang
WCC
2005
Springer
123views Cryptology» more  WCC 2005»
14 years 2 months ago
RSA-Based Secret Handshakes
A secret handshake mechanism allows two entities, members of a same group, to authenticate each other secretly. This primitive was introduced recently by Balfanz, Durfee, Shankar, ...
Damien Vergnaud
CIA
2000
Springer
14 years 26 days ago
A Social Mechanism of Reputation Management in Electronic Communities
Abstract. Trust is important wherever agents must interact. We consider the important case of interactions in electronic communities, where the agents assist and represent principa...
Bin Yu, Munindar P. Singh
CNSR
2010
IEEE
145views Communications» more  CNSR 2010»
14 years 13 days ago
Securing the Communications of Home Health Care Systems Based on RFID Sensor Networks
We address security solutions to protect the communication of the wireless components of a home health care system. We analyze especially the problem of exchanging secrets to sati...
Wiem Tounsi, Joaquín García-Alfaro, ...