Sciweavers

336 search results - page 15 / 68
» Mobile values, new names, and secure communication
Sort
View
FC
2008
Springer
134views Cryptology» more  FC 2008»
14 years 11 months ago
Generalized Non-Interactive Oblivious Transfer Using Count-Limited Objects with Applications to Secure Mobile Agents
Oblivious transfer (OT) is a fundamental primitive used in many cryptographic protocols, including general secure function evaluation (SFE) protocols. However, interaction is a pri...
Vandana Gunupudi, Stephen R. Tate
MATA
2004
Springer
139views Communications» more  MATA 2004»
15 years 3 months ago
Support for Context-Aware Collaboration
This paper describes a middleware architecture with its location inference service (LIS), and an application for context-aware mobile collaboration which is based on this architec...
Hana K. Rubinsztejn, Markus Endler, Vagner Sacrame...
ACNS
2011
Springer
244views Cryptology» more  ACNS 2011»
14 years 1 months ago
Quantitatively Analyzing Stealthy Communication Channels
Abstract. Attackers in particular botnet controllers use stealthy messaging systems to set up large-scale command and control. Understanding the capacity of such communication chan...
Patrick Butler, Kui Xu, Danfeng (Daphne) Yao
ICN
2009
Springer
15 years 2 months ago
New Algorithm for the Design of Topology Aware Hypercube in Multi-hop Ad Hoc Networks
Securing group communications in resource constrained, infrastructure-less environments such as Mobile Ad Hoc Networks (MANETs) has become one of the most challenging research dire...
Maria Striki, Kyriakos Manousakis, John S. Baras
SOUPS
2009
ACM
15 years 4 months ago
Usability and security of out-of-band channels in secure device pairing protocols
Initiating and bootstrapping secure, yet low-cost, ad-hoc transactions is an important challenge that needs to be overcome if the promise of mobile and pervasive computing is to b...
Ronald Kainda, Ivan Flechais, A. W. Roscoe