Sciweavers

43 search results - page 1 / 9
» Transitive Trust in Mobile Scenarios
Sort
View
ETRICS
2006
13 years 8 months ago
Transitive Trust in Mobile Scenarios
rorizontl integrtion of ess tehnologies to networks nd servies should e ompnied y some kind of onvergene of uthentiE tion tehnologiesF he missing link for the federtion of user ide...
Nicolai Kuntze, Andreas U. Schmidt
WOWMOM
2005
ACM
95views Multimedia» more  WOWMOM 2005»
13 years 10 months ago
Incremental Trust: Building Trust from Past Experience
Emerging ubiquitous computing leverages the need for automated trust management models. We take a domestic network of both fixed and mobile nodes as our reference scenario and in...
Marco Domenico Aime, Antonio Lioy
CORR
2006
Springer
97views Education» more  CORR 2006»
13 years 4 months ago
Trusted Computing in Mobile Action
Due to the convergence of various mobile access technologies like UMTS, WLAN, and WiMax the need for a new supporting infrastructure arises. This infrastructure should be able to ...
Nicolai Kuntze, Andreas U. Schmidt
CCS
2007
ACM
13 years 11 months ago
Hardware-rooted trust for secure key management and transient trust
We propose minimalist new hardware additions to a microprocessor chip that protect cryptographic keys in portable computing devices which are used in the field but owned by a cen...
Jeffrey S. Dwoskin, Ruby B. Lee
TMC
2008
90views more  TMC 2008»
13 years 4 months ago
Trust-Based Fast Authentication for Multiowner Wireless Networks
In multiowner wireless networks, access points (APs) are owned and operated by different administrations, leading to significant authentication delays during handoff between APs. W...
Jahan Hassan, Harsha Sirisena, Björn Landfeld...