Sciweavers

313 search results - page 36 / 63
» Efficient Implementation of XML Security for Mobile Devices
Sort
View
TIFS
2008
208views more  TIFS 2008»
14 years 9 months ago
A Network Coding Approach to Secret Key Distribution
We consider the problem of secret key distribution in a sensor network with multiple scattered sensor nodes and a mobile device that can be used to bootstrap the network. Our main...
Paulo F. Oliveira, João Barros
HUMAN
2003
Springer
15 years 3 months ago
Dynamic Deployment of Software Defined Radio Components for Mobile Wireless Internet Applications
Abstract. Software Defined Radio (SDR) is a key enabling technology for mobile wireless Internet. SDR represents unique opportunity to provide Internet connectivity to handheld dev...
Saehwa Kim, Jamison Masse, Seongsoo Hong
ADHOC
2007
104views more  ADHOC 2007»
14 years 10 months ago
An overlay approach to data security in ad-hoc networks
While it has been argued that application-layer overlay protocols can enhance services in mobile ad-hoc networks, hardly any empirical data is available on the throughput and dela...
Jörg Liebeherr, Guangyu Dong
IJNSEC
2008
135views more  IJNSEC 2008»
14 years 10 months ago
Software Implementations of Elliptic Curve Cryptography
Elliptic Curve Cryptography (ECC) is a promising alternative for public-key algorithms in resource-constrained systems because it provides a similar level of security with much sh...
Zhijie Jerry Shi, Hai Yun
WISEC
2010
ACM
14 years 10 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig