Sciweavers

1653 search results - page 86 / 331
» Timed analysis of security protocols
Sort
View
IFIPTM
2010
139views Management» more  IFIPTM 2010»
13 years 7 months ago
Metric Strand Spaces for Locale Authentication Protocols
Abstract. Location-dependent services are services that adapt their behavior based on the locations of mobile devices. For many applications, it is critical that location-dependent...
F. Javier Thayer, Vipin Swarup, Joshua D. Guttman
WS
2005
ACM
14 years 2 months ago
The security of vehicular networks
Vehicular networks are likely to become the most relevant form of ad hoc networks. In this paper, we address the security of these networks. We provide a detailed threat analysis ...
Jean-Pierre Hubaux
VTC
2010
IEEE
167views Communications» more  VTC 2010»
13 years 7 months ago
An Efficient Authentication Scheme for Security and Privacy Preservation in V2I Communications
—In this paper, we propose a mutual authentication and key agreement scheme for V2I communications. Our scheme improves security and privacy protection compared with the existing...
Jung-Yoon Kim, Hyoung-Kee Choi, John A. Copeland
WS
2003
ACM
14 years 2 months ago
Rushing attacks and defense in wireless ad hoc network routing protocols
In an ad hoc network, mobile computers (or nodes) cooperate to forward packets for each other, allowing nodes to communicate beyond their direct wireless transmission range. Many ...
Yih-Chun Hu, Adrian Perrig, David B. Johnson
HPCC
2005
Springer
14 years 2 months ago
Lazy Home-Based Protocol: Combining Homeless and Home-Based Distributed Shared Memory Protocols
Abstract. This paper presents our novel protocol design and implementation of an all-software page-based DSM system. The protocol combines the advantages of homeless and home-based...
Byung-Hyun Yu, Paul Werstein, Martin K. Purvis, St...