Čapkun et al., 2006 - Google Patents
Integrity regions: authentication through presence in wireless networksČapkun et al., 2006
- Document ID
- 6314267674379130407
- Author
- Čapkun S
- Čagalj M
- Publication year
- Publication venue
- Proceedings of the 5th ACM workshop on Wireless security
External Links
Snippet
We introduce Integrity (I) regions, a novel security primitive that enables message authentication in wireless networks without the use of pre-established or pre-certified keys. Integrity regions are based on the verification of entity proximity through time-of-arrival …
- 238000000034 method 0 abstract description 13
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Čapkun et al. | Integrity regions: authentication through presence in wireless networks | |
Cagalj et al. | Key agreement in peer-to-peer wireless networks | |
US8156337B2 (en) | Systems and methods for authenticating communications in a network medium | |
US20230155816A1 (en) | Internet of things security with multi-party computation (mpc) | |
Boyle et al. | Securing Wireless Sensor Networks: Security Architectures. | |
US7987363B2 (en) | Secure wireless communications system and related method | |
Siddhartha et al. | A lightweight authentication protocol using implicit certificates for securing IoT systems | |
Čapkun et al. | Integrity codes: Message integrity protection and authentication over insecure channels | |
Cagalj et al. | Integrity (I) codes: Message integrity protection and authentication over insecure channels | |
Liu et al. | Cryptanalysis of a SIP authentication scheme | |
Wong et al. | Repairing the Bluetooth pairing protocol | |
Wang et al. | Secure Enhanced IoT-WLAN Authentication Protocol With Efficient Fast Reconnection | |
Haataja | New efficient intrusion detection and prevention system for Bluetooth networks. | |
Zhang et al. | FKR: An efficient authentication scheme for IEEE 802.11 ah networks | |
Martucci et al. | A lightweight distributed group authentication mechanism | |
Krasnowski et al. | Introducing a Verified Authenticated Key Exchange Protocol over Voice Channels for Secure Voice Communication. | |
Claycomb et al. | Secure device pairing using audio | |
Abi-Char et al. | A secure and lightweight authenticated key agreement protocol for distributed IoT applications | |
Kwon et al. | Provably-secure two-round password-authenticated group key exchange in the standard model | |
Thite et al. | SecureAuthKey: design and evaluation of a lightweight key agreement technique for smart home applications | |
Berchtold et al. | Secure communication protocol for a low-bandwidth audio channel | |
Safdar et al. | Prevention against threats to self co-existence-a novel authentication protocol for cognitive radio networks | |
Wong | Protocols and technologies for security in pervasive computing and communications | |
Lu et al. | An advanced elliptic curve cryptography based mutual authentication scheme for session initiation protocol. | |
Tippenhauer | Integrity Regions: Authentication Through Presence in Wireless Networks |