Sciweavers

547 search results - page 16 / 110
» Analysis of a mobile communication security protocol
Sort
View
IEEEARES
2009
IEEE
15 years 4 months ago
Vulnerability Analysis and Attacks on NFC-Enabled Mobile Phones
Near Field Communication (NFC)-enabled mobile phones and services are starting to appear in the field, yet no attempt was made to analyze the security of NFC-enabled mobile phone...
Collin Mulliner
CORR
2006
Springer
206views Education» more  CORR 2006»
14 years 9 months ago
ANAP: Anonymous Authentication Protocol in Mobile Ad hoc Networks
The pervasiveness of wireless communication recently gave mobile ad hoc networks (MANET) a significant researcher's attention, due to its innate capabilities of instant commu...
Tomasz Ciszkowski, Zbigniew Kotulski
MA
2001
Springer
98views Communications» more  MA 2001»
15 years 1 months ago
A Scalable and Secure Global Tracking Service for Mobile Agents
In this paper, we propose a global tracking service for mobile agents, which is scalable to the Internet and accounts for security issues as well as the particularities of mobile a...
Volker Roth, Jan Peters
ISCC
2003
IEEE
138views Communications» more  ISCC 2003»
15 years 2 months ago
Authenticated Access for IPv6 Supported Mobility
Hierarchical Mobile IPv6 (HMIPv6) is a protocol that enhances Mobile IPv6 (MIPv6) with faster handovers. Neither HMIPv6 nor MIPv6 provides ways to authenticate roaming mobile node...
Paal Engelstad, Thomas Haslestad, Fréd&eacu...
CCR
2007
115views more  CCR 2007»
14 years 9 months ago
Analysis of the SPV secure routing protocol: weaknesses and lessons
We analyze a secure routing protocol, Secure Path Vector (SPV), proposed in SIGCOMM 2004. SPV aims to provide authenticity for route announcements in the Border Gateway Protocol (...
Barath Raghavan, Saurabh Panjwani, Anton Mityagin