Sciweavers

1226 search results - page 85 / 246
» Secure Mobile Gambling
Sort
View
128
Voted
GLOBECOM
2007
IEEE
15 years 10 months ago
Secure Key Management Architecture Against Sensor-Node Fabrication Attacks
Abstract—In lightweight mobile ad hoc networks, both probabilistic and deterministic key management schemes are fragile to node fabrication attacks. Our simulation results show t...
Jeffrey S. Dwoskin, Dahai Xu, Jianwei Huang, Mung ...
118
Voted
ICC
2007
IEEE
15 years 10 months ago
MobiSplit in a Virtualized, Multi-Device Environment
—This paper details a novel architecture, MobiSplit [17], for managing mobility in future IP based networks. The architecture separates mobility management in two levels, local a...
Julien Abeillé, Rui L. Aguiar, Joao Gir&ati...
139
Voted
WISTP
2010
Springer
15 years 1 months ago
Efficient and Effective Buffer Overflow Protection on ARM Processors
Although many countermeasures have been developed for desktop and server environments, buffer overflows still pose a big threat. The same approach can be used to target mobile devi...
Raoul Strackx, Yves Younan, Pieter Philippaerts, F...
123
Voted
BROADNETS
2006
IEEE
15 years 9 months ago
How to Specify and How to Prove Correctness of Secure Routing Protocols for MANET
Secure routing protocols for mobile ad hoc networks have been developed recently, yet, it has been unclear what are the properties they achieve, as a formal analysis of these prot...
Panagiotis Papadimitratos, Zygmunt J. Haas, Jean-P...
137
Voted
FSE
2003
Springer
123views Cryptology» more  FSE 2003»
15 years 9 months ago
The Security of "One-Block-to-Many" Modes of Operation
In this paper, we investigate the security, in the Luby-Rackoff security paradigm, of blockcipher modes of operation allowing to expand a one-block input into a longer t-block ou...
Henri Gilbert