نتایج جستجو برای: authentication protocols

تعداد نتایج: 131388  

Journal: :JNW 2013
K. V. Krishnam Raju Valli Kumari Vatsavayi

IEEE 802.11 is the standard designed to provide secured communication in wireless LAN. The IEEE 802.11i specification contains both WPA-PSK, WPA-GPG authentication protocols. IEEE 802.11w authentication protocol enhances the IEEE802.11i security for selected management frames. These protocols allow a wireless station to gain access to a protected wireless network managed by an access point. In ...

2014
Adarsh Kumar Krishna Gopal Alok Aggarwal

Internet of Things (IoT) is a pervasive environment to interconnect the things like: smart objects, devices etc. in a structure like internet. Things can be interconnected in IoT if these are uniquely addressable and identifiable. Radio Frequency Identification (RFID) is one the important radio frequency based addressing scheme in IoT. Major security challenge in resource constraint RFID networ...

Journal: :J. Internet Serv. Inf. Secur. 2011
William R. Claycomb Dongwan Shin

Authentication between mobile devices in ad-hoc computing environments is a challenging problem. Without pre-shared knowledge, existing applications must rely on additional communication methods, such as out-of-band or location-limited channels for device authentication. Much of the focus in development of new applications in this area seeks to reduce or eliminate the impact of this additional ...

Journal: :JCIT 2009
Changsheng Wan Aiqun Hu Juan Zhang

Mobility management is the key feature of wireless network. When the mobile node roams from the home network to the foreign network, the foreign network access server usually does not have the security material of the mobile node, and can not authenticate the mobile node by itself. Thus the three-party authentication is used, and the foreign network access server consults the home authenticatio...

2007
Wenbo Mao Colin Boyd

In many published authentication protocols, the cryptographic services are coarsely speciied in that, whenever needed, a uniform notation is used to denote them while the exact nature of protection required is left unclear. In this paper we reason that such a coarse treatment not only forms a foundation why authentication protocols are error prone, but is also responsible for a typical feature ...

Journal: :IEEE Transactions on Wireless Communications 2008

Journal: :International Journal of Computer Applications 2015

Journal: :Journal of Information Processing Systems 2011

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید