Protected resource access control utilizing credentials based on message authentication codes and hash chain values

DV Bailey, WM Duane, A Katz - US Patent 8,984,602, 2015 - Google Patents
(57) ABSTRACT A processing device comprises a processor coupled to a memory and is
configured to receive authentication informa tion from a user, to generate a message …

Protected resource access control utilizing intermediate values of a hash chain

DV Bailey, WM Duane, E Young - US Patent 8,990,905, 2015 - Google Patents
(57) ABSTRACT A processing device comprises a processor coupled to a memory and is
configured to associate intermediate values of a hash chain with respective access control …

Breaking the status quo: Improving 3D gesture recognition with spatially convenient input devices

M Hoffman, P Varcholik… - 2010 IEEE Virtual Reality …, 2010 - ieeexplore.ieee.org
We present a systematic study on the recognition of 3D gestures using spatially convenient
input devices. Specifically, we examine the linear acceleration-sensing Nintendo Wii …

An attack-resilient source authentication protocol in controller area network

KD Kang, Y Baek, S Lee, SH Son - 2017 ACM/IEEE Symposium …, 2017 - ieeexplore.ieee.org
While vehicle to everything (V2X) communication enables safety-critical automotive control
systems to better support various connected services to improve safety and convenience of …

Multiobjective routing for simultaneously optimizing system lifetime and source-to-sink delay in wireless sensor networks

MR Minhas, S Gopalakrishnan… - 2009 29th IEEE …, 2009 - ieeexplore.ieee.org
We target an interesting problem of simultaneous optimization of lifetime and source-to-sink
delay in wireless sensor networks, and present a fuzzy multiobjective online routing …

Remote management interface using credentials associated with respective access control intervals

DV Bailey, B Berg - US Patent 9,455,977, 2016 - Google Patents
(57) ABSTRACT A processing device comprises a processor coupled to a memory and is
configured to obtain a credential associated with a particular access control interval, to insert …

Using a cryptographic authentication protocol for the secure control of a robot over TCP/IP

B Groza, TL Dragomir - 2008 IEEE International Conference on …, 2008 - ieeexplore.ieee.org
The paper deals with the implementation of an authentication protocol, based on
cryptographic techniques, that is used in the communication necessary for the control of a …

Credential-based application programming interface keys

RW Griffin, DV Bailey - US Patent 9,503,442, 2016 - Google Patents
PROCESSOR requester device configured to carry out at least a portion of a given instance
of the API key enrollment protocol with a service provider device. The API key may comprise …

A practical and lightweight source authentication protocol using one-way hash chain in can

KD Kang - 2017 - scholar.dgist.ac.kr
While vehicle to everything (V2X) communication enables safety-critical automotive control
systems to better support various connected services to improve safety and convenience of …

[HTML][HTML] Multi-level group key management technique for multicast security in Manet

R Vennila, V Duraisamy - Journal of Theoretical and Applied Information …, 2013 - jatit.org
In Mobile AdHoc Networks (MANETs), data transmission is speeded up by means of
multicasting. Though multicast transmission lessens overhead, collision and congestion, it …