Sciweavers

547 search results - page 5 / 110
» Analysis of a mobile communication security protocol
Sort
View
65
Voted
MA
2000
Springer
134views Communications» more  MA 2000»
15 years 1 months ago
A Reliable Message Delivery Protocol for Mobile Agents
The abstractions and protocol mechanisms that form the basis for inter-agent communications can significantly impact the overall design and effectiveness of Mobile Agent systems. W...
Mudumbai Ranganathan, Marc Bednarek, Doug Montgome...
PKC
2000
Springer
84views Cryptology» more  PKC 2000»
15 years 1 months ago
Forward Secrecy and Its Application to Future Mobile Communications Security
Abstract. Perfect forward secrecy, one of the possible security features provided by key establishment protocols, concerns dependency of a session key upon long-term secret keys (s...
DongGook Park, Colin Boyd, Sang-Jae Moon
AINA
2006
IEEE
15 years 3 months ago
Property-Based Taming of Lying Mobile Nodes
Intelligent security protocols can verify whether the involved principals have properties that are defined based on certain functional and security policies. The property we focu...
Mark Manulis, Ahmad-Reza Sadeghi
NOMS
2000
IEEE
15 years 1 months ago
Threat analysis and security architecture of mobile agent based management systems
Security issues are very important for the acceptance of mobile agent technology in management. We present a threat analysis and security architecture for these problems.
Helmut Reiser, Gerald Vogt
WISEC
2009
ACM
15 years 4 months ago
An attacker model for MANET routing security
Mobile ad-hoc networks are becoming ever more popular due to their flexibility, low cost, and ease of deployment. However, to achieve these benefits the network must employ a so...
Jared Cordasco, Susanne Wetzel