Sciweavers

1490 search results - page 53 / 298
» The Logic of Authentication Protocols
Sort
View
CSE
2009
IEEE
13 years 6 months ago
Social Authentication Protocol for Mobile Phones
Bijan Soleymani, Muthucumaru Maheswaran
JCS
2011
55views more  JCS 2011»
13 years 3 months ago
Tree-based HB protocols for privacy-preserving authentication of RFID tags
Tzipora Halevi, Nitesh Saxena, Shai Halevi
PERCOM
2009
ACM
14 years 3 months ago
Randomizing RFID Private Authentication
—Privacy protection is increasingly important during authentications in Radio Frequency Identification (RFID) systems. In order to achieve high-speed authentication in largescale...
Qingsong Yao, Yong Qi, Jinsong Han, Jizhong Zhao, ...
WMASH
2003
ACM
14 years 2 months ago
Secure authentication system for public WLAN roaming
A serious challenge for seamless roaming between independent wireless LANs (WLANs) is how best to confederate the various WLAN service providers, each having different trust relat...
Yasuhiko Matsunaga, Ana Sanz Merino, Takashi Suzuk...