Sciweavers

154 search results - page 28 / 31
» Authenticity in a Reliable Protocol for Mobile Computing
Sort
View
USITS
1997
13 years 8 months ago
Lightweight Security Primitives for E-Commerce
Emerging applications in electronic commerce often involve very low-cost transactions, which execute in the context of ongoing, extended clientserver relationships. For example, c...
Yossi Matias, Alain J. Mayer, Abraham Silberschatz
SIGMOD
2009
ACM
153views Database» more  SIGMOD 2009»
14 years 7 months ago
ELMR: lightweight mobile health records
Cell phones are increasingly being used as common clients for a wide suite of distributed, database-centric healthcare applications in developing regions. This is particularly tru...
Arvind Kumar, Amey Purandare, Jay Chen, Arthur Mea...
IWCMC
2009
ACM
14 years 1 months ago
Dynamic trust establishment in emergency ad hoc networks
This paper proposes a dynamic trust establishment protocol that enables the nodes of an ad hoc network to establish security associations among each other in a distributed and pee...
Christos A. Papageorgiou, Konstantinos Birkos, Tas...
AGENTCL
2003
Springer
14 years 20 days ago
Intra-role Coordination Using Group Communication: A Preliminary Report
We propose group communication for agent coordination within “active rooms” and other pervasive computing scenarios featuring strict real-time requirements, inherently unrelia...
Paolo Busetta, Mattia Merzi, Silvia Rossi, Fran&cc...
ICDCSW
2003
IEEE
14 years 22 days ago
Foundations of Security for Hash Chains in Ad Hoc Networks
Nodes in ad hoc networks generally transmit data at regular intervals over long periods of time. Recently, ad hoc network nodes have been built that run on little power and have v...
Phillip G. Bradford, Olga V. Gavrylyako