Sciweavers

858 search results - page 16 / 172
» User Authentication in Sensor Networks
Sort
View
IJSN
2006
116views more  IJSN 2006»
13 years 8 months ago
A lightweight encryption and authentication scheme for wireless sensor networks
: The research of Wireless Sensor Networks (WSNs) has recently received a strong boost from IEEE 802.15.4 task group, which focuses on the specifications for low rate wireless pers...
Jianliang Zheng, Jie Li, Myung J. Lee, Michael Ans...
JMM
2007
107views more  JMM 2007»
13 years 8 months ago
Using a Spatial Context Authentication Proxy for Establishing Secure Wireless Connections
Spontaneous interaction in wireless ad-hoc networks is often desirable not only between users or devices in direct contact, but also with devices that are accessible only via a wi...
Rene Mayrhofer, Roswitha Gostner
MIDDLEWARE
2005
Springer
14 years 1 months ago
A new two-message authentication protocol for RFID sensor networks
Ê Ó Ö ÕÙ Ò Ý Á ÒØ Ø ÓÒ ´Ê Á µ Ø ÒÓÐÓ Ý × Ñ ¹ Ø Ó ØÓ Ö ÑÓØ ÐÝ ×ØÓÖ Ò Ö ØÖ Ú Ø Ù× Ò ×Ñ ÐÐ Ñ ¹ ÖÓ Ô ÐÐ Ø Ê Á Ø ...
Selma Boumerdassi, Papa Kane Diop, Éric Ren...
AINA
2009
IEEE
14 years 1 months ago
Advantages of User Authentication Using Unclear Images
— A user authentication system using "unclear images" as pass-images has been proposed, in which only legitimate users can understand their meaning by viewing the origi...
Takumi Yamamoto, Atsushi Harada, Takeo Isarida, Ma...