Sciweavers

195 search results - page 21 / 39
» Protocols with Security Proofs for Mobile Applications
Sort
View
IFIPTM
2010
139views Management» more  IFIPTM 2010»
14 years 10 months ago
Metric Strand Spaces for Locale Authentication Protocols
Abstract. Location-dependent services are services that adapt their behavior based on the locations of mobile devices. For many applications, it is critical that location-dependent...
F. Javier Thayer, Vipin Swarup, Joshua D. Guttman
IJNSEC
2008
152views more  IJNSEC 2008»
14 years 11 months ago
Group Key Management in MANETs
Specific applications like military or public emergency ones require secure group communication in ad hoc environments. The most suitable solution to provide the expected level of...
Mohamed Salah Bouassida, Isabelle Chrisment, Olivi...
WMASH
2004
ACM
15 years 5 months ago
Secure universal mobility for wireless internet
The advent of the mobile wireless Internet has created the need for seamless and secure communication over heterogeneous access networks such as IEEE 802.11, WCDMA, cdma2000, and ...
Ashutosh Dutta, Tao Zhang, Sunil Madhani, Kenichi ...
WWIC
2005
Springer
179views Communications» more  WWIC 2005»
15 years 5 months ago
Limiting Control Overheads Based on Link Stability for Improved Performance in Mobile Ad Hoc Networks
The widespread use of Mobile Ad Hoc Networks (MANETs) in many fields of applications has led to the continuous development of routing protocols which can perform well when deployed...
Hwee Xian Tan, Winston Khoon Guan Seah
AINA
2011
IEEE
14 years 3 months ago
Auctions for Secure Multi-party Policy Negotiation in Ambient Intelligence
—The advent of distributed and ad-hoc-connected systems such as in Ambient Intelligence applications confronts developers with the question on how to specify QoS- and security po...
Julian Schütte, Stephan Heuser