Basic access authentication
Semantic Scholar uses AI to extract papers important to this topic.
Wireless sensors and actuators connected by the Internet-of-Things (IoT) are central to the design of advanced cyber–physical… Expand An effective and secure authentication mechanism is one of the important part in implementation of communication protocol in a… Expand While modern block ciphers, such as AES, have a block size of at least 128 bits, there are many 64-bit block ciphers, such as… Expand With the popularity of location-based services and the abundant usage of smart phones and GPS-enabled devices, the necessity of… Expand Hopper and Blum (Asiacrypt 2001) and Juels and Weis (Crypto 2005) recently proposed two shared-key authentication protocols—HB… Expand As wireless LANs as well as the high-speed broadband Internet service are widely deployed, the VoIP service has become popular… Expand Most users have multiple accounts on the Internet where each account is protected by a password. To avoid the headache in… Expand "HTTP/1.0", includes the specification for a Basic Access Authentication scheme. This scheme is not considered to be a secure… Expand Mobile IP provides mobility support for hosts connected to the Internet without changing their IP addresses. Route optimization… Expand The protocol referred to as "HTTP/1.0" includes the specification for a Basic Access Authentication scheme. This scheme is not… Expand