Sciweavers

745 search results - page 9 / 149
» Proxy-based security protocols in networked mobile devices
Sort
View
TMC
2012
11 years 11 months ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
SASN
2003
ACM
14 years 1 months ago
SECTOR: secure tracking of node encounters in multi-hop wireless networks
In this paper we present SECTOR, a set of mechanisms for the secure verification of the time of encounters between nodes in multi-hop wireless networks. This information can be u...
Srdjan Capkun, Levente Buttyán, Jean-Pierre...
ICIW
2007
IEEE
14 years 2 months ago
A New Security Scheme for Integration of Mobile Agents and Web Services
Web services specification provides an open standard for the distributed service oriented architecture. It is widely used in Internet and pervasive networks supporting wireless m...
Junqi Zhang, Yan Wang 0002, Vijay Varadharajan
ISCC
2003
IEEE
14 years 1 months ago
Supporting Mobile Devices in Gnutella File Sharing Network with Mobile Agents
The use of peer to peer file sharing networks such as Gnutella is proliferating on the Internet, but its use is bandwidth consuming due to the broadcast nature of some peer to pee...
Tim Hsin-Ting Hu, Binh Thai, Aruna Seneviratne
ESORICS
2010
Springer
13 years 9 months ago
Providing Mobile Users' Anonymity in Hybrid Networks
We present a novel hybrid communication protocol that guarantees mobile users' k-anonymity against a wide-range of adversaries by exploiting the capability of handheld devices...
Claudio Agostino Ardagna, Sushil Jajodia, Pierange...