Sciweavers

1226 search results - page 72 / 246
» Secure Mobile Gambling
Sort
View
BROADNETS
2005
IEEE
15 years 3 months ago
Measuring performance impact of security protocols in wireless local area networks
- In this paper, we study and quantify the impact of the most widely used security protocols, such as 802.1x, EAP, IPSEC, SSL and RADIUS, in wireless local area networks (WLANs). B...
Avesh Kumar Agarwal, Wenye Wang
ISCC
2000
IEEE
100views Communications» more  ISCC 2000»
15 years 2 months ago
FATIMA: A Firewall-Aware Transparent Internet Mobility Architecture
Ubiquitous communication will be one of the paradigms for the next decades. The use of the Internet in such applications demands for a highly reliable and secure system, especiall...
Stefan Mink, Frank Pählke, Günter Sch&au...
CCS
2010
ACM
14 years 10 months ago
Efficient sensor node authentication via 3GPP mobile communication networks
Energy efficiency is one of important issues in the resource contrained wireless sensor network. In this paper, we propose the authentication and key agreement protocol that effic...
Kyusuk Han, Jangseong Kim, Kwangjo Kim, Taeshik Sh...
MA
2001
Springer
98views Communications» more  MA 2001»
15 years 2 months ago
On the Robustness of Some Cryptographic Protocols for Mobile Agent Protection
Mobile agent security is still a young discipline and most naturally, the focus up to the time of writing was on inventing new cryptographic protocols for securing various aspects ...
Volker Roth
FSTTCS
2005
Springer
15 years 3 months ago
Non-disclosure for Distributed Mobile Code
Abstract. This paper addresses the issue of confidentiality and declassification for global computing in a language-based security perspective. The purpose is to deal with new fo...
Ana Almeida Matos