Sciweavers

4111 search results - page 54 / 823
» Security, Protocols, and Trust
Sort
View
AINA
2005
IEEE
14 years 2 months ago
Designing Secure Wireless Mobile Ad Hoc Networks
In recent years, security in MANET is anticipated as the pre-establishment of specific information among the participating nodes, so that the future communications can be secured ...
Venkatesan Balakrishnan, Vijay Varadharajan
EUROSEC
2008
ACM
13 years 10 months ago
Case study: automated security testing on the trusted computing platform
Gergely Tóth, Gábor Koszegi, Zolt&aa...
WPES
2004
ACM
14 years 2 months ago
Hidden access control policies with hidden credentials
In an open environment such as the Internet, the decision to collaborate with a stranger (e.g., by granting access to a resource) is often based on the characteristics (rather tha...
Keith B. Frikken, Mikhail J. Atallah, Jiangtao Li
WISTP
2009
Springer
14 years 3 months ago
On the Unobservability of a Trust Relation in Mobile Ad Hoc Networks
Olivier Heen, Gilles Guette, Thomas Genet