Sciweavers

761 search results - page 72 / 153
» Security Aspects of Mobile Communications
Sort
View
WIMOB
2008
IEEE
14 years 4 months ago
Random Beacon for Privacy and Group Security
Abstract—Most contemporary security mechanisms and protocols include exchange of random or time-variant nonces as an essential means of protection against replay and other threat...
Aleksi Saarela, Jan-Erik Ekberg, Kaisa Nyberg
IPL
2006
141views more  IPL 2006»
13 years 10 months ago
Perfectly Reliable Message Transmission
We study the problem of Perfectly Reliable Message Transmission (PRMT) and Perfectly Secure Message Transmission (PSMT) between two nodes S and R in an undirected synchronous netw...
Arvind Narayanan, K. Srinathan, C. Pandu Rangan
ASWEC
2006
IEEE
14 years 4 months ago
Formally Analysing a Security Protocol for Replay Attacks
The Kerberos-One-Time protocol is a key distribution protocol promoted for use with Javacards to provide secure communication over the GSM mobile phone network. From inspection we...
Benjamin W. Long, Colin J. Fidge
INFOCOM
2002
IEEE
14 years 3 months ago
SWAN: Service Differentiation in Stateless Wireless Ad Hoc Networks
—We propose SWAN, a stateless network model which uses distributed control algorithms to deliver service differentiation in mobile wireless ad hoc networks in a simple, scalable ...
Gahng-Seop Ahn, Li-Hsiang Sun, Andras Veres, Andre...
ICC
2009
IEEE
174views Communications» more  ICC 2009»
14 years 4 months ago
Biometric Mobile Template Protection: A Composite Feature Based Fingerprint Fuzzy Vault
—Biometric authentication is emerging as the promising solution to conventional cryptography based authentication technologies. However, protecting users’ biometric templates s...
Kai Xi, Jiankun Hu