125
click to vote
SPC
15 years 2 months ago
2005 Springer
The ephemeral pairing problem requires two or more specific physical nodes in a wireless broadcast network, that do not yet know each other, to establish a short-term relationship...
100
click to vote
SPC
15 years 2 months ago
2005 Springer
Alice first meets Bob in an entertainment shop, then, they wish to share multimedia content, but Do they know what are trustworthy users? How do they share such information in a s...
SPC
15 years 2 months ago
2005 Springer
As Global Positioning System (GPS) receivers become a common feature in cell phones, personal digital assistants, and automobiles, there is a growing interest in tracking larger us...
112
click to vote
SPC
15 years 2 months ago
2005 Springer
In pervasive computing environments, changes in context may trigger changes in an individual’s access permissions. We contend that existing access control frameworks do not provi...
107
click to vote
SPC
15 years 2 months ago
2005 Springer
We develop the theme of an earlier paper [3], namely that security protocols for pervasive computing frequently need to exploit empirical channels and that the latter can be classi...
|