Search For:

Displaying 1-3 out of 3 total
Toward More Secure and Reliable Access Control
Found in: IEEE Pervasive Computing
By R. Peeters,D. Singelee,B. Preneel
Issue Date:March 2012
pp. 76-83
Conventional access control mechanisms, relying on a single security token to authenticate remote users, introduce a single point of failure and are vulnerable to relay attacks. A threshold-based distance-bounding protocol that distributes a user's private...
Setting up a Secure Web Server and Clients on an Intranet
Found in: Enabling Technologies, IEEE International Workshops on
By J. Claessens, M. Vandenwauver, B. Preneel, J. Vandewalle
Issue Date:June 1998
pp. 295
No summary available.
Location verification using secure distance bounding protocols
Found in: IEEE International Conference on Mobile Adhoc and Sensor Systems Conference
By D. Singelee, B. Preneel
Issue Date:November 2005
pp. 840
Authentication in conventional networks (like the Internet) is usually based upon something you know (e.g., a password), something you have (e.g., a smartcard) or something you are (biometrics). In mobile ad-hoc networks, location information can also be u...