CS Store Search
Displaying 1-3 out of 3 total
Toward More Secure and Reliable Access Control
IEEE Pervasive Computing
By R. Peeters,D. Singelee,B. Preneel
Issue Date:March 2012
Conventional access control mechanisms, relying on a single security token to authenticate remote users, introduce a single point of failure and are vulnerable to relay attacks. A threshold-based distance-bounding protocol that distributes a user's private...
Setting up a Secure Web Server and Clients on an Intranet
Enabling Technologies, IEEE International Workshops on
By J. Claessens, M. Vandenwauver, B. Preneel, J. Vandewalle
Issue Date:June 1998
No summary available.
Location verification using secure distance bounding protocols
IEEE International Conference on Mobile Adhoc and Sensor Systems Conference
By D. Singelee, B. Preneel
Issue Date:November 2005
Authentication in conventional networks (like the Internet) is usually based upon something you know (e.g., a password), something you have (e.g., a smartcard) or something you are (biometrics). In mobile ad-hoc networks, location information can also be u...
Original Search Engine
Need a Web Account?
Become a Member
This site and all contents (unless otherwise noted) are Copyright ©2008, IEEE, Inc. All rights reserved.