Sciweavers

1519 search results - page 228 / 304
» Authentication for Mobile Agents
Sort
View
AINA
2005
IEEE
14 years 3 months ago
A Practical Modelling Notation for Secure Distributed Computation
Mobile code computation has lead to a new paradigm of distributed computation. A mobile process can move from site to site and interact with the resources as a local process. To p...
Yih-Jiun Lee, Peter Henderson
ADHOCNOW
2005
Springer
14 years 3 months ago
Enhancing the Security of On-demand Routing in Ad Hoc Networks
We present the Ad-hoc On-demand Secure Routing (AOSR) protocol, which uses pairwise shared keys between pairs of mobile nodes and hash values keyed with them to verify the validity...
Zhenjiang Li, J. J. Garcia-Luna-Aceves
KIVS
2005
Springer
14 years 3 months ago
Exploiting Regular Hot-Spots for Drive-thru Internet
Abstract. IEEE 802.11 WLAN technology has become an inexpensive, yet powerful access technology that is targeted at mobile users that remain within reach of the hot-spot. Such hot-...
Jörg Ott, Dirk Kutscher
INFOCOM
2003
IEEE
14 years 3 months ago
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks
Abstract— As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad ho...
Yih-Chun Hu, Adrian Perrig, David B. Johnson
ACSAC
2004
IEEE
14 years 1 months ago
PEACE: A Policy-Based Establishment of Ad-hoc Communities
Ad-hoc networks are perceived as communities of autonomous devices that interconnect with each other. Typically, they have dynamic topologies and cannot rely on a continuous conne...
Sye Loong Keoh, Emil Lupu, Morris Sloman