Sciweavers

745 search results - page 69 / 149
» Proxy-based security protocols in networked mobile devices
Sort
View
NTMS
2009
IEEE
14 years 3 months ago
Q-ESP: A QoS-Compliant Security Protocol to Enrich IPSec Framework
—IPSec is a protocol that allows to make secure connections between branch offices and allows secure VPN accesses. However, the efforts to improve IPSec are still under way; one ...
Mahmoud Mostafa, Anas Abou El Kalam, Christian Fra...
CSFW
2007
IEEE
14 years 3 months ago
Security Analysis of Voice-over-IP Protocols
The transmission of voice communications as datagram packets over IP networks, commonly known as Voice-overIP (VoIP) telephony, is rapidly gaining wide acceptance. With private ph...
Prateek Gupta, Vitaly Shmatikov
ICN
2007
Springer
14 years 2 months ago
Energy Efficiency in the Mobile Ad Hoc Networking Approach to Monitoring Farm Animals
—Using Mobile Ad Hoc Networks (MANETs) for monitoring bovine animals potentially offers high increase in the profitability of cattle production. In this paper we propose a formal...
Bartosz Wietrzyk, Milena Radenkovic
NDSS
2002
IEEE
14 years 1 months ago
Talking to Strangers: Authentication in Ad-Hoc Wireless Networks
In this paper we address the problem of secure communication and authentication in ad-hoc wireless networks. This is a difficult problem, as it involves bootstrapping trust betwe...
Dirk Balfanz, Diana K. Smetters, Paul Stewart, H. ...
CCS
2009
ACM
14 years 3 months ago
On non-cooperative location privacy: a game-theoretic analysis
In mobile networks, authentication is a required primitive of the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudo...
Julien Freudiger, Mohammad Hossein Manshaei, Jean-...