Towards A Secure And User Friendly Authentication Method For Public Wireless Networks


Download Towards A Secure And User Friendly Authentication Method For Public Wireless Networks PDF/ePub or read online books in Mobi eBooks. Click Download or Read Online button to get Towards A Secure And User Friendly Authentication Method For Public Wireless Networks book now. This website allows unlimited access to, at the time of writing, more than 1.5 million titles, including hundreds of thousands of titles in various foreign languages.

Download

Towards a Secure and User Friendly Authentication Method for Public Wireless Networks


Towards a Secure and User Friendly Authentication Method for Public Wireless Networks

Author: Carolin Latze

language: en

Publisher: Logos Verlag Berlin GmbH

Release Date: 2010


DOWNLOAD





The goal of this thesis was to develop a secure and user friendly authentication scheme for public wireless networks (PWLANs). In contrast to private wireless networks, public wireless networks need a proper authentication scheme for several reasons. First of all, the network operator must be able to identify a user in case an incident happens. Furthermore, such networks are usually controlled by a commercial operator who will hardly allow access for free. This leads to the need for a secure and reliable authentication method. However, the authentication method must be userfriendly too in order to be acceptable. The only "wireless networks" users know so far are cellular networks, which are very easy to use. Users do therefore ask for a comparable experience in public wireless networks. This thesis evaluates the Trusted Platform Module (TPM) as an authentication device. The TPM is a small cryptographic module built into almost every new computer. This thesis shows how to use the TPM as an authentication device in EAPTLS. Furthermore, this thesis shows theoretical and real world evaluations of EAPTLS with the TPM. It will be shown that this authentication method provides a good level of security as well as good usability.

Cryptology and Network Security


Cryptology and Network Security

Author: David Pointcheval

language: en

Publisher: Springer

Release Date: 2006-11-15


DOWNLOAD





This book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS 2006, held in Suzhou, China, December 2006. The 26 revised full papers and 2 invited papers cover encryption, authentication and signatures, proxy signatures, cryptanalysis, implementation, steganalysis and watermarking, boolean functions and stream ciphers, intrusion detection, and disponibility and reliability.

Wireless and mobile networks


Wireless and mobile networks

Author: Mr. Rohit Manglik

language: en

Publisher: EduGorilla Publication

Release Date: 2024-09-24


DOWNLOAD





Focuses on wireless communication technologies including mobile networks, WLAN, Bluetooth, and cellular systems. Discusses protocols, architectures, and security in mobile environments.