Sciweavers

236 search results - page 22 / 48
» Secure Biometric Authentication for Weak Computational Devic...
Sort
View
SPAA
2010
ACM
14 years 13 days ago
Securing every bit: authenticated broadcast in radio networks
This paper studies non-cryptographic authenticated broadcast in radio networks subject to malicious failures. We introduce two protocols that address this problem. The first, Nei...
Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zark...
HUC
2010
Springer
13 years 8 months ago
Groupthink: usability of secure group association for wireless devices
A fairly common modern setting entails users, each in possession of a personal wireless device, wanting to communicate securely, via their devices. If these users (and their devic...
Rishab Nithyanand, Nitesh Saxena, Gene Tsudik, Ers...
ICCSA
2010
Springer
14 years 2 months ago
Authentication - Based Medium Access Control to Prevent Protocol Jamming: A-MAC
Abstract. Recently, Wireless Local Area Network (WLAN) is used by enterprises, government, and the military, as well as small office and home offices. Although it is convenient, it...
Jaemin Jeung, Seungmyeong Jeong, Jaesung Lim
HICSS
2003
IEEE
129views Biometrics» more  HICSS 2003»
14 years 28 days ago
Peer-to-Peer Networks for Virtual Home Environments
This paper presents au approach to extend OSGi server based home networks with JXTA’s peer-topeer (PZP) technoIogy to a mzdti-server home environment connecting multiple private...
Chris Loeser, Wolfgang Müller 0003, Frank Ber...
SOUPS
2010
ACM
13 years 11 months ago
A closer look at recognition-based graphical passwords on mobile devices
Graphical password systems based on the recognition of photographs are candidates to alleviate current over-reliance on alphanumeric passwords and PINs. However, despite being bas...
Paul Dunphy, Andreas P. Heiner, N. Asokan