Sciweavers

547 search results - page 41 / 110
» Analysis of a mobile communication security protocol
Sort
View
ICC
2007
IEEE
151views Communications» more  ICC 2007»
15 years 8 months ago
Local Update-Based Routing Protocol in Wireless Sensor Networks with Mobile Sinks
- Mobile sinks can be a viable solution to solve the problem that energy consumption is not balanced for all the sensor nodes in Wireless Sensor Networks (WSNs). Frequent location ...
Guojun Wang, Tian Wang, Weijia Jia, Minyi Guo, Hsi...
118
Voted
AINA
2004
IEEE
15 years 5 months ago
Generating Digital Signatures on Mobile Devices
With the explosion of the mobile communication market, more and more handheld devices act as clients in the Internet. People use these devices to purchase books, play games, recei...
Yu Lei, Deren Chen, Zhongding Jiang
JCP
2006
120views more  JCP 2006»
15 years 1 months ago
Password-authenticated Key Exchange using Efficient MACs
Abstract-- This paper is concerned with passwordauthenticated key agreement protocols. Designing such protocols represents an interesting challenge since there is no standard way o...
Maurizio Adriano Strangio
INFOCOM
2006
IEEE
15 years 7 months ago
An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol
Skype is a peer-to-peer VoIP client developed by KaZaa in 2003. Skype claims that it can work almost seamlessly across NATs and firewalls and has better voice quality than the MSN...
Salman Baset, Henning Schulzrinne
CADE
2011
Springer
14 years 1 months ago
Deciding Security for Protocols with Recursive Tests
Abstract. Security protocols aim at securing communications over public networks. Their design is notoriously difficult and error-prone. Formal methods have shown their usefulness ...
Mathilde Arnaud, Véronique Cortier, St&eacu...