Sciweavers

1120 search results - page 178 / 224
» Trust in Electronic Environments
Sort
View
JSAC
2006
136views more  JSAC 2006»
13 years 7 months ago
Secure data communication in mobile ad hoc networks
We address the problem of secure and fault-tolerant communication in the presence of adversaries across a multihop wireless network with frequently changing topology. To effectivel...
Panagiotis Papadimitratos, Zygmunt J. Haas
IFIP
2010
Springer
13 years 6 months ago
Service Migration Protocol for NFC Links
Abstract. In future ubiquitous communication environments, users expect to move freely while continuously interacting with the available applications through a variety of devices. ...
Anders Nickelsen, Miquel Martin, Hans-Peter Schwef...
PERCOM
2010
ACM
13 years 6 months ago
ReSCo: A middleware component for Reliable Service Composition in pervasive systems
Abstract—Service composition schemes create high-level application services by combining several basic services. Service composition schemes for dynamic, open systems, such as th...
Brent Lagesse, Mohan Kumar, Matthew Wright
CCS
2010
ACM
13 years 5 months ago
Adjustable autonomy for cross-domain entitlement decisions
Cross-domain information exchange is a growing problem, as business and governmental organizations increasingly need to integrate their information systems with those of partially...
Jacob Beal, Jonathan Webb, Michael Atighetchi
JDCTA
2010
150views more  JDCTA 2010»
13 years 2 months ago
Provable Password-Authenticated Key Exchange Protocol against Imposter Attack on Ad Hoc Networks
In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encrypted Key Exchange (EKE) protocol against offline dictionary attacks using both ...
Ang Gao