scispace - formally typeset
J

Johnas I. Cukier

Researcher at Mitsubishi Electric Research Laboratories

Publications -  15
Citations -  700

Johnas I. Cukier is an academic researcher from Mitsubishi Electric Research Laboratories. The author has contributed to research in topics: Mobile device & Session key. The author has an hindex of 7, co-authored 15 publications receiving 698 citations. Previous affiliations of Johnas I. Cukier include Mitsubishi Electric.

Papers
More filters
Patent

Environment aware services for mobile devices

TL;DR: In this paper, a system delivers multimedia services to mobile devices via a network by registering a mobile device with a service manager connected to the mobile device via the network, where each application service provider is associated with particular multimedia services.
Proceedings ArticleDOI

Fast authenticated key establishment protocols for self-organizing sensor networks

TL;DR: A hybrid authenticated key establishment scheme, which exploits the difference in capabilities between security managers and sensors, and put the cryptographic burden where the resources are less constrained, which is better than all the other public-key based key establishment protocols studied.
Patent

Secure routing protocol for an ad hoc network using one-way/one-time hash functions

TL;DR: In this article, a one-way/one-time hash function is applied to the current password to form a current tag and a next password is selected for a next packet that includes next data.
Proceedings ArticleDOI

A security design for a general purpose, self-organizing, multihop ad hoc wireless network

TL;DR: The design employs elliptic-curve cryptography and the AES block cipher to supply message integrity and encryption services, key-establishment protocols, and a large set of extended security services, while at the same time meeting the low implementation cost, low power, and high flexibility requirements of ad hoc wireless networks.
Patent

Token-enabled authentication for securing mobile devices

TL;DR: In this paper, a system and method to protect mobile devices, such as laptops, PDAs, and mobile telephones with a wearable token is presented, which performs token-enabled authentication to enable operation of the mobile device.