Mobile software industry is suffering from the illegal usage of the software. PKI will not be a solution for small software distribution. We introduce a lightweight but safe metho...
— This paper investigates the problem of secret key transmissions for an arbitrary Alice-Bob pair in Quantum Key Distribution (QKD)-based networks. We develop a realistic QKDbase...
— In a typical mobile ad hoc network, mobile computing devices wander autonomously and communicate via temporary links in a self-organized computing system without any central ad...
The existence of a central security authority is too restrictive for pervasive computing environments. Existing distributed security schemes fail in a pervasive computing environm...
In this paper, we propose that identity reference used over distributed communication should be defined independent from any attributes and/or the public keys associated with the ...