Relying party trust anchor based public key technology framework
D Karchov - US Patent 7,844,816, 2010 - Google Patents
A PKI (public key infrastructure) enables users of a basi cally unsecure public network Such
as the Internet to securely and privately exchange data and execute transactions through the …
as the Internet to securely and privately exchange data and execute transactions through the …
Towards Robust and Low Latency Security Framework for IEEE 802.11 Wireless Networks
IU Haq, S Ramzan, N Ahmad, Y Ahmad… - … Journal of Computing …, 2024 - journals.uob.edu.bh
The vulnerability in wireless networks require additional security, integrity, and
authentication. The outdated" Counter Mode Cipher Block Chaining Message Authentication …
authentication. The outdated" Counter Mode Cipher Block Chaining Message Authentication …
Attacks and security mechanisms
A Naveed, SS Kanhere, SK Jha… - Security in Wireless …, 2008 - api.taylorfrancis.com
The true potential of any network cannot be exploited without considering and adequately
addressing the security issues. Wireless mesh networks (WMNs), being multi-hop wireless …
addressing the security issues. Wireless mesh networks (WMNs), being multi-hop wireless …
Towards an autonomic security system for mobile ad hoc networks
M Aljnidi, J Leneutre - Third International Symposium on …, 2007 - ieeexplore.ieee.org
We present our paradigm of autonomic networks through a specific model of mobile ad hoc
networks. Accordingly, we define a security platform, in which we introduce basic solutions …
networks. Accordingly, we define a security platform, in which we introduce basic solutions …
Robust RSA distributed signatures for large-scale long-lived ad hoc networks
G Zanin, R Di Pietro, LV Mancini - Journal of Computer …, 2007 - content.iospress.com
Ad hoc environments are subject to tight security and architectural constraints, which call for
distributed, adaptive, robust and efficient solutions. In this paper we propose a distributed …
distributed, adaptive, robust and efficient solutions. In this paper we propose a distributed …
Towards secure resource sharing for impromptu collaboration in pervasive computing
W Claycomb, D Shin - Proceedings of the 2007 ACM symposium on …, 2007 - dl.acm.org
Access control in mobile and pervasive computing is a complex issue, with many aspects
relating to the establishment, management, and enforcement of methods and policies that …
relating to the establishment, management, and enforcement of methods and policies that …
A security policy system for mobile autonomic networks
M Aljnidi, J Leneutre - 1st International ICST Conference on Autonomic …, 2007 - eudl.eu
An autonomic security system is indispensable for the operation of an autonomic network.
Policies are basic stones in building autonomic systems. In this paper, we introduce our …
Policies are basic stones in building autonomic systems. In this paper, we introduce our …
[PDF][PDF] Trust and the establishment of ad-hoc communities
The proliferation of computing devices, which are being progressively embedded in the
objects of everyday life, gives rise to numerous interactions and “collaborations” between …
objects of everyday life, gives rise to numerous interactions and “collaborations” between …
Adaptive access control in coordination-based mobile agent systems
The increased pervasiveness of mobile devices like cell phones, PDAs, and laptops draws
attention to the need for coordination among these networked devices. The very nature of …
attention to the need for coordination among these networked devices. The very nature of …
[PDF][PDF] A platform for leveraging blockchain technology for the storage, issuance and authentication of academic credentials
K Batzavalis, R Bala, A Norta, O Norta Partners - 2021 - icobliss.com
Academic credential verification is a critical process that almost all individuals have to go
through at some point in their lives. Proving the validity of one's academic qualification is not …
through at some point in their lives. Proving the validity of one's academic qualification is not …