Conference item icon

Conference item

FADEWICH: Fast deauthentication over the wireless channel

Abstract:

Both authentication and deauthentication are instrumental for preventing unauthorized access to computers and other resources. While there are obvious motivating factors for using strong authentication mechanisms, convincing users to deauthenticate is not straight-forward, since deauthentication is not considered mandatory. A user who leaves a logged-in workstation unattended (especially for a short time) is typically not inconvenienced in any way; in fact, the other way around-no annoying re...

Expand abstract
Publication status:
Published
Peer review status:
Peer reviewed

Actions


Access Document


Files:
Publisher copy:
10.1109/ICDCS.2017.296

Authors


More by this author
Institution:
University of Oxford
Division:
MPLS Division
Department:
Computer Science
Role:
Author
More by this author
Institution:
University of Oxford
Division:
MPLS
Department:
Computer Science
Oxford college:
Kellogg College
Role:
Author
Publisher:
Institute of Electrical and Electronics Engineers Publisher's website
Host title:
37th IEEE International Conference on Distributed Computing Systems (ICDCS 2017)
Journal:
37th IEEE International Conference on Distributed Computing Systems (ICDCS 2017) Journal website
Publication date:
2017-07-17
Acceptance date:
2017-02-28
DOI:
ISSN:
1063-6927
Source identifiers:
667658
Keywords:
Subjects:
Pubs id:
pubs:667658
UUID:
uuid:4e91bae8-4b43-4f30-9fa1-dee9a6368268
Local pid:
pubs:667658
Deposit date:
2018-04-30

Terms of use


Views and Downloads






If you are the owner of this record, you can report an update to it here: Report update to this record

TO TOP