Introduction to mobile computing
By Sandeep Jain, December 2000
By Sandeep Jain, December 2000
By Lourens O. Walters, P. S. Kritzinger, December 2000
By Debalina Ghosh, December 2000
By Dipanjan Chakraborty, Harry Chen, December 2000
By Kostas Pentikousis, December 2000
By Theodore Chiasson, Carrie Gates, September 2000
By Shvetima Gulati, July 2000
By Kevin Henry, July 2000
By Wei-Mei Shyr, Brian Borowski, September 1999
By Roberto A. Flores-Mendez, June 1999
By George Crawford, May 1998
By G. Bowden Wise, November 1996
By Lorrie Faith Cranor, April 1996
The explosive growth of networked and internetworked computer systems during the past decade has brought about a need for increased protection mechanisms. This paper discusses three authentication protocols that incorporate the use of methods that present effective user authentication. The first two protocols have been previously discussed in the literature; the third protocol draws from the first two and others to produce an authentication scheme that provides both mutual authentication and secure key distribution which is easy to use, is compatible with present operating systems, is transparent across systems, and provides password file protection.
By Charles Cavaiani, Jim Alves-Foss, April 1996
By Scott Ruthfield, September 1995
By Jeremy Buhler, September 1995
By Vernard Martin, February 1995
By Bradley M. Kuhn, David W. Binkley, December 1994
By Craig Pfeifer, September 1994