Sciweavers

43 search results - page 4 / 9
» Transitive Trust in Mobile Scenarios
Sort
View
EUROPKI
2007
Springer
14 years 1 months ago
Security-by-Contract: Toward a Semantics for Digital Signatures on Mobile Code
In this paper we propose the notion of security-by-contract, a mobile contract that an application carries with itself. The key idea of the framework is that a digital signature sh...
Nicola Dragoni, Fabio Massacci, Katsiaryna Naliuka...
CSE
2009
IEEE
13 years 11 months ago
Reliable Identities Using Off-the-Shelf Hardware Security in MANETs
Application scenarios for mobile ad-hoc networks (MANETs) impose a variety of non-standard security requirements. furthermore, in many scenarios owner and user of devices do not a...
Nicolai Kuntze, Andreas Fuchs, Carsten Rudolph
SASN
2006
ACM
14 years 1 months ago
Robust cooperative trust establishment for MANETs
In a mobile ad hoc network (MANET), a source node must rely on intermediate nodes to forward its packets along multihop routes to the destination node. Due to the lack of infrastr...
Charikleia Zouridaki, Brian L. Mark, Marek Hejmo, ...
CSREASAM
2008
13 years 9 months ago
Secure Resource Sharing in Ad hoc Networks
Abstract Mobile and wireless devices become more popular and their capabilities increase as well. At the same time, most of the today's PC power is unused, as a study of the G...
Michaela Greiler, Peter Schartner
AINA
2008
IEEE
14 years 1 months ago
Parameterless Broadcasting in Static to Highly Mobile Wireless Ad Hoc, Sensor and Actuator Networks
—In a broadcasting task, source node wants to send the same message to all the other nodes in the network. Existing solutions range from connected dominating set (CDS) based for ...
Adnan Afsar Khan, Ivan Stojmenovic, Nejib Zaguia