Wireless Authentication in chi-Spaces

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Wireless authentication in χ-Spaces

The χ-Spaces framework [CCM02b] provides a set of tools to support every step of the security protocol’s life-cycle. The framework includes a simple, yet powerful programming language which is an implementation of the Security Protocol Language (SPL) [CW01]. SPL is a formal calculus designed to model security protocols and prove interesting properties about them. In this paper we take an authen...

متن کامل

Authentication Protocols in Wireless Communications

This paper examines authentication protocols used for wireless communications, especially in the multi-operator environment, to see what security services they provide and how they do it. Weaknesses of each protocol and differences among them will also be discussed.

متن کامل

Authentication via wireless networks

Personal authentication is an important process we encounter almost every day; when we are logging on a computer, entering a company where we work, or a restricted area, when we are using our plastic credit cards to pay for a service or to complete some other financial transaction, etc. In each of these processes of personal authentication some kind of magnetic or optical token is required. But...

متن کامل

Hermes: Hands-Free Authentication in Physical Spaces

This paper presents Hermes, a hands-free authentication system that makes use of credentials stored on a users smartphone to authenticate them when they enter a physical space or the vicinity of a physical object. By combining Bluetooth LE and Kerberos, Hermes is a novel system that makes use of existing technology available in today’s internet-connected devices. This makes a system like Hermes...

متن کامل

Manual authentication for wireless devices

Manual authentication techniques have been designed to enable wireless devices to authenticate one another via an insecure wireless channel with the aid of a manual transfer of data between the devices. Manual transfer refers to the human operator of the devices performing one of the following procedures: copying data output from one device into the other device, comparing the output of the two...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: BRICS Report Series

سال: 2003

ISSN: 1601-5355,0909-0878

DOI: 10.7146/brics.v10i10.21781