Sciweavers

1150 search results - page 121 / 230
» Beacon Based Authentication
Sort
View
CSFW
2009
IEEE
14 years 3 months ago
Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks
We present a formal model for modeling and reasoning about security protocols. Our model extends standard, inductive, trace-based, symbolic approaches with a formalization of phys...
Patrick Schaller, Benedikt Schmidt, David A. Basin...
NTMS
2009
IEEE
14 years 3 months ago
A Comprehensive Reference Architecture for Trustworthy Long-Term Archiving of Sensitive Data
Abstract—It is well known that the suitability of many cryptographic algorithms decreases with time. Hence, it is a challenging task to maintain the integrity, authenticity, con...
Detlef Hühnlein, Ulrike Korte, Lucie Langer, ...
NOMS
2008
IEEE
139views Communications» more  NOMS 2008»
14 years 3 months ago
Harmonizing service and network provisioning for federative access in a mobile environment
—In this paper we propose an integrated platform to power the symbiosis between networks and services whilst supporting mobility of users. This platform is based on methods for a...
David J. Lutz, Patrick Mandic, Sascha Neinert, Rut...
ICCCN
2007
IEEE
14 years 3 months ago
Safeguarding Mutable Fields in AODV Route Discovery Process
— Assuring cryptographic integrity of mutable fields in any on-demand ad hoc routing protocol is more challenging than that of non mutable fields. We propose an efficient auth...
Kulasekaran A. Sivakumar, Mahalingam Ramkumar
MOBIQUITOUS
2007
IEEE
14 years 3 months ago
Key Establishment Using Secure Distance Bounding Protocols
Key establishment is one of the major challenges in Wireless Personal Area Networks, as traditional security mechanisms often do not cope with the dynamic characteristics of wirel...
Dave Singelée, Bart Preneel