Sciweavers

722 search results - page 119 / 145
» Offering Mobile Security as a Service
Sort
View
FGCN
2008
IEEE
144views Communications» more  FGCN 2008»
14 years 1 months ago
A Novel Approach for Infrastructure Deployment for VANET
In last decade intelligent transportation systems (ITS) and vehicular ad hoc network (VANET) became one of the most active and emerging fields of research. It is expected that thi...
Une Thoing Rosi, Chowdhury Sayeed Hyder, Tai-hoon ...
ISCC
2009
IEEE
176views Communications» more  ISCC 2009»
14 years 2 months ago
Integrating user Identity Management systems with the Host Identity Protocol
Abstract—Identity Management (IdM) on the application layer improves the usability and security for end users by offering features like Single Sign-On and attribute provisioning....
Marc Barisch, Alfredo Matos
ADT
2010
13 years 7 months ago
An EAP-EHash authentication method adapted to resource constrained terminals
: In the era of mobile and wireless networks, the growing complexity of end devices and the accentuated tendency towards miniaturization of them raise new security challenges. Auth...
Omar Cheikhrouhou, Maryline Laurent, Amin Ben Abda...
SOFSEM
1998
Springer
13 years 11 months ago
Distributed Systems Technology for Electronic Commerce Applications
Abstract. Based on the specific characteristics of electronic commerce (ECommerce) requirements for an adequate system support, this contribution gives an overview of the respectiv...
Winfried Lamersdorf, Michael Merz, M. Tuan Tu
ISCAPDCS
2003
13 years 8 months ago
Performance of a Jini-based Ad Hoc Network Authentication Scheme
Ad hoc networks provide a dynamically reconfigurable network infrastructure where entities can participate at will. Jini technology can be used to implement an ad hoc network, and...
M. M. McMahon, D. M. Needham, J. B. Datko