Sciweavers

336 search results - page 35 / 68
» Mobile values, new names, and secure communication
Sort
View
ISM
2008
IEEE
111views Multimedia» more  ISM 2008»
15 years 4 months ago
Secure and Low Cost Selective Encryption for JPEG2000
Selective encryption is a new trend in content protection. It aims at reducing the amount of data to encrypt while achieving a sufficient and inexpensive security. This approach ...
Ayoub Massoudi, Frédéric Lefè...
118
Voted
CISC
2005
Springer
169views Cryptology» more  CISC 2005»
15 years 3 months ago
On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography
Abstract. Despite many good (secure) key agreement protocols based on publickey cryptography exist, secure associations between two wireless devices are often established using sym...
Serge Vaudenay
INFOCOM
2003
IEEE
15 years 2 months ago
Prophet Address Allocation for Large Scale MANETs
—A mobile device in a MANET must be assigned a free IP address before it may participate in unicast communication. This is a fundamental and difficult problem in the practical us...
Hongbo Zhou, Lionel M. Ni, Matt W. Mutka
ICCSA
2005
Springer
15 years 3 months ago
Mobile Mini-payment Scheme Using SMS-Credit
Mobile Phone has been widely used in the world and adopted in different application areas involved with SMS has been evolved for downloading logo, ring-tones, advertisement, secur...
Simon Fong, Edison Lai
ISCC
2003
IEEE
15 years 2 months ago
On the Issues of IP Traceback for IPv6 and Mobile IPv6
As the Internet becomes pervasive, the vulnerability of some fundamental design aspects of the Internet has also become significant. Among which, Denial-of-Service (DoS) and Distr...
Henry C. J. Lee, Miao Ma, Vrizlynn L. L. Thing, Yi...