Sciweavers

547 search results - page 66 / 110
» Analysis of a mobile communication security protocol
Sort
View
CCS
2010
ACM
15 years 1 months ago
Dissent: accountable anonymous group messaging
Users often wish to participate in online groups anonymously, but misbehaving users may abuse this anonymity to disrupt the group's communication. Existing messaging protocol...
Henry Corrigan-Gibbs, Bryan Ford
E4MAS
2004
Springer
15 years 7 months ago
Supporting Context-Aware Interaction in Dynamic Multi-agent Systems
The increasing ubiquity of mobile computing devices has made mobile ad hoc networks an everyday occurrence. Applications in these networks are commonly structured as a logical netw...
Christine Julien, Gruia-Catalin Roman
ACSAC
2006
IEEE
15 years 7 months ago
Bluetooth Worms: Models, Dynamics, and Defense Implications
Recent occurrences of mobile worms like Cabir, Mabir and CommWarrior have created growing concerns over the security of data stored on mobile devices such as cell phones and PDAs....
Guanhua Yan, Stephan Eidenbenz
INFOCOM
2011
IEEE
14 years 5 months ago
Ubiquitous data collection for mobile users in wireless sensor networks
Abstract—We study the ubiquitous data collection for mobile users in wireless sensor networks. People with handheld devices can easily interact with the network and collect data....
Zhenjiang Li, Mo Li, Jiliang Wang, Zhichao Cao
ICC
2007
IEEE
108views Communications» more  ICC 2007»
15 years 8 months ago
Trust Establishment in Distributed Networks: Analysis and Modeling
— Recently, trust establishment is recognized as an important approach to defend distributed networks, such as mobile ad hoc networks and sensor networks, against malicious attac...
Yan Lindsay Sun, Yafei Yang