Sciweavers

154 search results - page 5 / 31
» Authenticity in a Reliable Protocol for Mobile Computing
Sort
View
ISICT
2003
13 years 10 months ago
Security protocols for 2G and 3G wireless communications
Wireless communications are being driven by the need for providing network access to mobile or nomadic computing devices. The need for wireless access to a network is evident in c...
T. Newe, Tom Coffey
JNW
2006
149views more  JNW 2006»
13 years 8 months ago
Authenticated AODV Routing Protocol Using One-Time Signature and Transitive Signature Schemes
Mobile ad hoc network (MANET) has been generally regarded as an ideal network model for group communications because of its specialty of instant establishment. However, the securit...
Shidi Xu, Yi Mu, Willy Susilo
APNOMS
2006
Springer
14 years 8 days ago
An Efficient Authentication and Simplified Certificate Status Management for Personal Area Networks
Abstract. Recently the concept of personal PKI was introduced to describe a public key infrastructure specifically designed to support the distribution of public keys in a personal...
Chul Sur, Kyung Hyune Rhee
MOBICOM
1996
ACM
14 years 20 days ago
Security on the Move: Indirect Authentication using Kerberos
Even as mobile computing and network computing are gaining momentum, Internet security is sharing the spotlight. Security and authentication on open networks is already a difficul...
Armando Fox, Steven D. Gribble
TPDS
2002
118views more  TPDS 2002»
13 years 8 months ago
A Study of Adaptive Forward Error Correction for Wireless Collaborative Computing
This paper addresses the problem of reliably multicasting Web resources across wireless local area networks (WLANs) in support of collaborative computing applications. An adaptive ...
Philip K. McKinley, Chiping Tang, Arun P. Mani