Sciweavers

920 search results - page 120 / 184
» Selecting Secure Passwords
Sort
View
ICMB
2005
IEEE
76views Business» more  ICMB 2005»
14 years 2 months ago
ZoneIT: Using Short-Range Radios to Control Mobile Device Functionality
This paper describes a prototype system, ZoneIT, for selectively controlling functionality of mobile devices, e.g. ringing of cellular telephones. ZoneIT exploits the fact that ma...
Tim Moors, Marvyn Mei, Agus Salim

Publication
152views
14 years 14 days ago
Expected loss analysis of thresholded authentication protocols in noisy conditions
A number of authentication protocols have been proposed recently, where at least some part of the authentication is performed during a phase, lasting $n$ rounds, with no error corr...
Christos Dimitrakakis, Aikaterini Mitrokotsa, Serg...
WICON
2008
13 years 10 months ago
Using the EAP framework for fast media independent handover authentication
In this paper we compare different authentication techniques that may be used in order to reduce the time and resources required to perform a handover: namely, re-authentication a...
Antonio Izquierdo, Nada Golmie, Katrin Hoeper, Lid...
DIMVA
2004
13 years 10 months ago
A Honeynet within the German Research Network - Experiences and Results
: A honeynet is a special prepared network which is not used in normal business. It is a kind of playground to watch and learn the tactics of crackers. The only purpose of a honeyn...
Helmut Reiser, Gereon Volker
MOBIHOC
2009
ACM
14 years 9 months ago
Efficient uncoordinated FHSS anti-jamming communication
We address the problem of jamming-resistant communication in scenarios in which the communicating parties do not share secret keys. This includes scenarios where the communicating...
Mario Strasser, Christina Pöpper, Srdjan Capk...