Sciweavers

644 search results - page 22 / 129
» Adaptive security protocol selection for mobile computing
Sort
View
P2P
2008
IEEE
149views Communications» more  P2P 2008»
14 years 2 months ago
AREX: An Adaptive System for Secure Resource Access in Mobile P2P Systems
In open environments, such as mobile peer-to-peer systems, participants may need to access resources from unknown users. A critical security concern in such systems is the access ...
Brent Lagesse, Mohan Kumar, Matthew Wright
RTSS
2006
IEEE
14 years 2 months ago
Design of Location Service for a Hybrid Network of Mobile Actors and Static Sensors
Location services are essential to many applications running on a hybrid of wirelessly-networked mobile actors and static sensors, such as surveillance systems and the Pursuer and...
Zhigang Chen, Min Gyu Cho, Kang G. Shin
GI
2001
Springer
14 years 28 days ago
Access of Mobile IP Users to Firewall Protected VPNs
: The paper describes an architecture allowing Mobile IP hosts to access to a virtual private network that is protected by a firewall from the public Internet. The implementation b...
Marc Danzeisen, Torsten Braun
HICSS
2003
IEEE
136views Biometrics» more  HICSS 2003»
14 years 1 months ago
Dynamic Network Interface Selection in Multihomed Mobile Hosts
Abstract—Current mobile devices are often equipped with several network interfaces, which may be of different access technologies, both wireless and cellular. Different requireme...
Jukka Ylitalo, Tony Jokikyyny, Tero Kauppinen, Ant...
FOCS
2010
IEEE
13 years 6 months ago
Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions
We construct the first general secure computation protocols that require no trusted infrastructure other than authenticated communication, and that satisfy a meaningful notion of s...
Ran Canetti, Huijia Lin, Rafael Pass