Sciweavers

IJNSEC
2006
134views more  IJNSEC 2006»
13 years 11 months ago
Physical Security Perimeters for Wireless Local Area Networks
On a wired network, physical authentication is implicitly provided by access: if a user is able to plug a cable into a network socket, he must have cleared other security checks s...
Vishal Bhargava, Mihail L. Sichitiu
IJNSEC
2006
66views more  IJNSEC 2006»
13 years 11 months ago
On the Security of Signature Scheme with Message Recovery and Its Application
In 2004, Sekhar proposed a new signature scheme with message recovery. Based on this signature scheme with message recovery, they also proposed a designated verifier signature sch...
Eun-Jun Yoon, Kee-Young Yoo
IJNSEC
2006
107views more  IJNSEC 2006»
13 years 11 months ago
ID-based Signcryption Scheme with (t, n) Shared Unsigncryption
An identity-based signcryption scheme with (t, n) shared unsigncryption is proposed, which is the integration of the signcryption scheme, the (t, n) threshold scheme and zero know...
Fagen Li, Xiangjun Xin, Yupu Hu
IJNSEC
2006
143views more  IJNSEC 2006»
13 years 11 months ago
Password Authentication Schemes: Current Status and Key Issues
Password authentication is one of the simplest and the most convenient authentication mechanisms to deal with secret data over insecure networks. It is more frequently required in...
Chwei-Shyong Tsai, Cheng-Chi Lee, Min-Shiang Hwang