Sciweavers

632 search results - page 37 / 127
» Two Facets of Authentication
Sort
View
MASS
2010
118views Communications» more  MASS 2010»
13 years 6 months ago
Implementation and evaluation of distance-based message authentication
A new generation of WSN communication transceivers are now available that support time-of-flight distance measurement. This measurement can be inseparably integrated with message t...
Antony Chung, Utz Roedig
POST
2012
181views more  POST 2012»
12 years 4 months ago
Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication
Abstract. We formally analyze the family of entity authentication protocols defined by the ISO/IEC 9798 standard and find numerous weaknesses, both old and new, including some th...
David A. Basin, Cas J. F. Cremers, Simon Meier
DSN
2004
IEEE
14 years 20 days ago
Dependable Adaptive Real-Time Applications in Wormhole-based Systems
This paper describes and discusses the work carried on in the context of the CORTEX project, for the development of adaptive real-time applications in wormhole based systems. The ...
Pedro Martins, Paulo Jorge Paiva de Sousa, Antonio...
MP
2011
13 years 3 months ago
On the relative strength of split, triangle and quadrilateral cuts
Integer programs defined by two equations with two free integer variables and nonnegative continuous variables have three types of nontrivial facets: split, triangle or quadrilat...
Amitabh Basu, Pierre Bonami, Gérard Cornu&e...
CTRSA
2009
Springer
142views Cryptology» more  CTRSA 2009»
14 years 3 months ago
Attacks on the DECT Authentication Mechanisms
Digital Enhanced Cordless Telecommunications (DECT) is a standard for connecting cordless telephones to a fixed telecommunications network over a short range. The cryptographic al...
Stefan Lucks, Andreas Schuler, Erik Tews, Ralf-Phi...