Sciweavers

1573 search results - page 28 / 315
» Strong User Authentication
Sort
View
IPPS
2007
IEEE
14 years 5 months ago
Transaction Based Authentication Scheme for Mobile Communication: A Cognitive Agent Based Approach
The vulnerable air interface, device level constraints, and insecure encryption techniques of wireless networks have naturally increased the chance of attacker obtaining users inf...
B. Sathish Babu, Pallapa Venkataram
IJNSEC
2008
127views more  IJNSEC 2008»
13 years 11 months ago
Reducing Communication Overhead for Wireless Roaming Authentication: Methods and Performance Evaluation
The protocol design for wireless roaming authentication is challenging because of the key management regarding users and home/visited networks. In this paper, we present two authe...
Men Long, Chwan-Hwa John Wu, J. David Irwin
TIFS
2008
145views more  TIFS 2008»
13 years 10 months ago
Physical-Layer Authentication
Authentication is the process where claims of identity are verified. Most mechanisms of authentication (e.g., digital signatures and certificates) exist above the physical layer, t...
Paul L. Yu, John S. Baras, Brian M. Sadler
ESORICS
2009
Springer
14 years 11 months ago
Super-Efficient Aggregating History-Independent Persistent Authenticated Dictionaries
Authenticated dictionaries allow users to send lookup requests to an untrusted server and get authenticated answers. Persistent authenticated dictionaries (PADs) add queries agains...
Scott A. Crosby, Dan S. Wallach