Classic security systems use a trust model centered in the authentication procedure, which depends on a naming service. Even when using a Public Key Infrastructure as X.509, such s...
Altair Olivo Santin, Joni da Silva Fraga, Carlos M...
Protection of agent data state and partial results in mobile agent systems continues to draw research interest. Current solutions to integrity attacks are geared at detection of m...
J. Todd McDonald, Alec Yasinsac, Willard C. Thomps...
We present a new non-interactive key agreement and progression (NIKAP) scheme for mobile ad hoc networks (MANETs), which does not require an on-line centralized authority, can non...
Digital identity management intra and inter information systems, and, service oriented architectures security, are the roots of identity federation. This kind of security architec...
Since privacy information can be inferred via social relations, the privacy confidentiality problem becomes increasingly challenging as online social network services are more popu...