Sciweavers

1351 search results - page 67 / 271
» Trust in Anonymity Networks
Sort
View
ICC
2009
IEEE
171views Communications» more  ICC 2009»
13 years 6 months ago
IPsec-Based Anonymous Networking: A Working Implementation
Protecting users' privacy is becoming one of the rising issues for the success of future communications. The Internet in particular, with its open architecture, presents sever...
Csaba Király, Renato Lo Cigno
SPC
2005
Springer
14 years 2 months ago
Ephemeral Pairing on Anonymous Networks
The ephemeral pairing problem requires two or more specific physical nodes in a wireless broadcast network, that do not yet know each other, to establish a short-term relationship...
Jaap-Henk Hoepman
POLICY
2005
Springer
14 years 2 months ago
Driving and Monitoring Provisional Trust Negotiation with Metapolicies
We introduce the provisional trust negotiation framework PROTUNE, for combining distributed trust management policies with provisional-style business rules and accesscontrol relat...
Piero A. Bonatti, Daniel Olmedilla
JDCTA
2010
139views more  JDCTA 2010»
13 years 3 months ago
Tracing Anonymous Mobile Attackers in Wireless Network
In a flooding-based distributed denial-of-service (DDoS) attack, an adversary attempts to exhaust a target's computing resource. To detect DDoS attacks in a network environme...
Ming Hour Yang, Shiuhpyng Shieh
CMS
1996
167views Communications» more  CMS 1996»
13 years 10 months ago
Anonymous Mobility Management for Third Generation Mobile Networks
With the increasing use of mobile and nomadic communication devices requirements for security and privacy are rising as well. Following brief surveys of existing approaches to mob...
Simon Hoff, Kai Jakobs, Dogan Kesdogan