The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As the world is becoming more and more flowing, networked, and composite organizations will continue to be more mobile than ever by. One part of the challenge for future mobile organizations is how can they communicate and exchange information securely within their clients, employees, and all other stockholders. Wireless communications offer organizations and individuals many benefits such as portability,...
In this paper, the security of user domain including mobile terminal (MT) and user in heterogeneous wireless networks (HWN) are paid more attention. We introduce the trusted platform module (TPM) to ensure the terminal trustworthiness, while password, fingerprint and smartcard guarantee userpsilas identity. MT, user, and smartcard have been regarded as three separated entities, as well as the user...
In the recent years, wireless mesh network (WMN) has evolved as a new paradigm for broadband wireless Internet access. The self-configurability, open wireless infrastructure, and different management styles of WMN make them vulnerable to malicious attackers. As a first step to secure WMNs, it is critical to incorporate an authentication mechanism for mesh clients. The existing proposals are primarily...
Recently, secure group-oriented applications have grown very rapidly. In order to provide secure group communication, WMNs (Wireless Mesh Network) are required to establish a secret key which is shared with all participants. Recently, Tseng proposed an authenticated group key agreement for regarding mobile networks. This mobile network is an asymmetric wireless network which includes many low-power...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.