The potential software market for client-side mobile applications is strongly dependent upon the ability to rapidly migrate existing in-house software solutions, while maintaining...
We show how untrusted computers can be used to facilitate secure mobile data access. We discuss a novel architecture, data staging, that improves the performance of distributed ...
Jason Flinn, Shafeeq Sinnamohideen, Niraj Tolia, M...
This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
In this paper we present SECTOR, a set of mechanisms for the secure verification of the time of encounters between nodes in multi-hop wireless networks. This information can be u...
Referral networks are a kind of P2P system consisting of autonomous agents who seek, provide services, or refer other service providers. Key applications include service discovery...