Sciweavers

745 search results - page 76 / 149
» Proxy-based security protocols in networked mobile devices
Sort
View
ICC
2007
IEEE
114views Communications» more  ICC 2007»
14 years 3 months ago
Personal Network Routing Protocol (PNRP) for Personal Ubiquitous Environments
— The proliferation of heterogeneous devices, ranging from mobile communication to home electronics and their internetworking have resulted into the development of a "person...
Usman Javaid, Djamal-Eddine Meddour, Tinku Mohamed...
TDSC
2011
13 years 3 months ago
A Policy Enforcing Mechanism for Trusted Ad Hoc Networks
To ensure fair and secure communication in Mobile Ad hoc Networks (MANETs), the applications running in these networks must be regulated by proper communication policies. However,...
Gang Xu, Cristian Borcea, Liviu Iftode
ESORICS
2000
Springer
14 years 11 days ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud
TWC
2008
143views more  TWC 2008»
13 years 8 months ago
Mobile Privacy in Wireless Networks-Revisited
Abstract-- With the widespread use of mobile devices, the privacy of mobile location information becomes an important issue. In this paper, we present the requirements on protectin...
Caimu Tang, Dapeng Oliver Wu
CORR
2010
Springer
116views Education» more  CORR 2010»
13 years 3 months ago
Simulating Cyber-Attacks for Fun and Profit
We introduce a new simulation platform called Insight, created to design and simulate cyber-attacks against large arbitrary target scenarios. Insight has surprisingly low hardware...
Ariel Futoransky, Fernando Miranda, José Ig...