Πλοήγηση ανά Συγγραφέα "Viswanathan, H."
-
Detecting and Preventing Machine-to-Machine Hijacking Attacks in Cellular Networks
Broustis, I.; Sundaram, G. S.; Viswanathan, H. (2012)Machine-to-machine (M2M) communications are increasingly popular over cellular networks, due to their unlimited potential and the low cost of deployment. As a result, M2M infrastructures are attractive targets to attackers. ... -
Group Authentication: A New Paradigm for Emerging Applications
Broustis, I.; Sundaram, G. S.; Viswanathan, H. (2012)Traditional secure registration protocols rely on client-server authentication procedures. This concept has been extended to support single client registration to multiple servers, using single sign-on protocols. In this ...