Security policies are rules that constrain the behaviour of a system. Different, largely unrelated sets of rules typically govern the physical and logical worlds. However, increa...
Pieter H. Hartel, Pascal van Eck, Sandro Etalle, R...
With the mobile computing evolution, portable devices have emerged in the market with the possibility of connection to IP networks using wireless technologies. The migration from f...
Abstract. This paper describesa method for establishing ad hoc and infrastructuremode wireless network connections based on physical proximity. Users can easily establish secure wi...
Abstract. M–commerce is a new area arising from the marriage of electronic commerce with emerging mobile and pervasive computing technology. The newness of this area—and the ra...
Suresh Chari, Parviz Kermani, Sean W. Smith, Leand...
Abstract. We provide a simple secret-key two-party secure communication scheme, which is provably information-theoretically secure in the limited-storage-space model. The limited-s...