Abstract. In this work we present a security model for low-value transactions in ad-hoc networks in which we focus on authentication since this is the core requirement for commerci...
Driven by the ubiquitous deployment of mobile systems, the widespread use of the Internet, the rapid advances in wireless technologies, the insatiable demand for high-speed interac...
We present a formal, symbolic definition of election verifiability for electronic voting protocols in the context of the applied pi calculus. Our definition is given in terms of bo...
Social-tagging communities offer great potential for smart recommendation and "socially enhanced" searchresult ranking. Beyond traditional forms of collaborative recomme...
Ralf Schenkel, Tom Crecelius, Mouna Kacimi, Thomas...
In this paper, we propose some cryptographic techniques to securely set up a mobile ad-hoc network. The process is fully self-managed by the nodes, without any trusted party. New ...
Vanesa Daza, Javier Herranz, Paz Morillo, Carla R&...