Sciweavers

547 search results - page 70 / 110
» Analysis of a mobile communication security protocol
Sort
View
MOBIHOC
2005
ACM
16 years 1 months ago
Scalable location services for hierarchically organized mobile ad hoc networks
This paper proposes a location service to assist location-based routing protocols, realized through a novel Associativity-Based clustering protocol. The main goal of our scheme, w...
Siva Sivavakeesar, George Pavlou
ISCC
2007
IEEE
15 years 8 months ago
Validating Attacks on Authentication Protocols
— It is possible to show that well-known attacks on authentication protocols are flawed. This is a problem, since good protocols may thus be dismissed rather than improved and p...
Anders Moen Hagalisletto
AFRICACRYPT
2010
Springer
15 years 8 months ago
Flexible Group Key Exchange with On-demand Computation of Subgroup Keys
Modern multi-user communication systems, including popular instant messaging tools, social network platforms, and cooperative-work applications, offer flexible forms of communica...
Michel Abdalla, Céline Chevalier, Mark Manu...
MOMM
2006
ACM
168views Communications» more  MOMM 2006»
15 years 7 months ago
Mobile P2P Web Service Creation using SIP
: Telecommunication networks and the Internet are growing together. Peer-to-Peer (P2P) services which are originally offered by network providers, like telephony and messaging, ar...
Guido Gehlen, Fahad Aijaz, Yi Zhu, Bernhard Walke
ACISP
2006
Springer
15 years 7 months ago
Towards Provable Security for Ubiquitous Applications
Abstract. The emergence of computing environments where smart devices are embedded pervasively in the physical world has made possible many interesting applications and has trigger...
Mike Burmester, Tri Van Le, Breno de Medeiros