Sciweavers

644 search results - page 17 / 129
» Adaptive security protocol selection for mobile computing
Sort
View
TC
2008
13 years 6 months ago
Computationally Efficient PKI-Based Single Sign-On Protocol, PKASSO for Mobile Devices
In an attempt to expand Public Key Infrastructure (PKI) usage to a ubiquitous and mobile computing environment, we found that the deployment of the PKI on a resource-constrained de...
Ki-Woong Park, Sang Seok Lim, Kyu Ho Park
SOCA
2007
IEEE
14 years 1 months ago
Mobile Agent and Web Service Integration Security Architecture
Mobile agent technology and Web Service technology compensate each other and play very important roles in eservice applications. The mechanism of Web Services technology naturally...
Junqi Zhang, Yan Wang 0002, Vijay Varadharajan
IACR
2011
147views more  IACR 2011»
12 years 6 months ago
Adaptive Security of Concurrent Non-Malleable Zero-Knowledge
A zero-knowledge protocol allows a prover to convince a verifier of the correctness of a statement without disclosing any other information to the verifier. It is a basic tool a...
Zhenfu Cao, Zongyang Zhang, Yunlei Zhao
AINA
2006
IEEE
13 years 10 months ago
An Adaptive Multipath Protocol for Efficient IP Handoff in Mobile Wireless Networks
Achieving IP handoff with a short latency and minimal packet loss is essential for mobile devices that roam across IP subnets. Many existing solutions require changes to be made t...
Ken C. K. Tsang, Roy S. C. Ho, Mark C. M. Tsang, C...
VTC
2007
IEEE
116views Communications» more  VTC 2007»
14 years 1 months ago
Applicability of a Multi-Mode MAC Protocol
— Future mobile radio networks will have the requirement of very high data rates. Typical wireless data communication will not only occur in short range scenarios like hotspots i...
Arif Otyakmaz, Ismet Aktas, Marc Schinnenburg, Ral...