Sciweavers

644 search results - page 2 / 129
» Adaptive security protocol selection for mobile computing
Sort
View
CN
2007
115views more  CN 2007»
13 years 6 months ago
Energy-aware QoS for application sessions across multiple protocol domains in mobile computing
The proliferation of heterogeneous devices and diverse networking technologies demands flexible models to guarantee the quality-of-service(QoS) at the application session level, ...
Hanping Lufei, Weisong Shi
ECOOPW
1998
Springer
13 years 10 months ago
Secure Recording of Itineraries through Co-operating Agents
Security is a fundamental precondition for the acceptance of mobile agent systems. In this paper we discuss protocols to improve agent security by distributing critical data and o...
Volker Roth
CCS
2001
ACM
13 years 11 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
TCC
2005
Springer
163views Cryptology» more  TCC 2005»
14 years 2 days ago
Adaptive Security of Symbolic Encryption
Abstract. We prove a computational soundness theorem for the symbolic analysis of cryptographic protocols which extends an analogous theorem of Abadi and Rogaway (J. of Cryptology ...
Daniele Micciancio, Saurabh Panjwani
PPNA
2011
13 years 1 months ago
Evaluation framework for adaptive context-aware routing in large scale mobile peer-to-peer systems
The proliferation of novel wireless network technologies creates new opportunities for complex peerto-peer information dissemination systems. A key challenge that remains in this a...
Ansar-Ul-Haque Yasar, Davy Preuveneers, Yolande Be...