Relying party trust anchor based public key technology framework

D Karchov - US Patent 7,844,816, 2010 - Google Patents
A PKI (public key infrastructure) enables users of a basi cally unsecure public network Such
as the Internet to securely and privately exchange data and execute transactions through the …

Towards Robust and Low Latency Security Framework for IEEE 802.11 Wireless Networks

IU Haq, S Ramzan, N Ahmad, Y Ahmad… - … Journal of Computing …, 2024 - journals.uob.edu.bh
The vulnerability in wireless networks require additional security, integrity, and
authentication. The outdated" Counter Mode Cipher Block Chaining Message Authentication …

Attacks and security mechanisms

A Naveed, SS Kanhere, SK Jha… - Security in Wireless …, 2008 - api.taylorfrancis.com
The true potential of any network cannot be exploited without considering and adequately
addressing the security issues. Wireless mesh networks (WMNs), being multi-hop wireless …

Towards an autonomic security system for mobile ad hoc networks

M Aljnidi, J Leneutre - Third International Symposium on …, 2007 - ieeexplore.ieee.org
We present our paradigm of autonomic networks through a specific model of mobile ad hoc
networks. Accordingly, we define a security platform, in which we introduce basic solutions …

Robust RSA distributed signatures for large-scale long-lived ad hoc networks

G Zanin, R Di Pietro, LV Mancini - Journal of Computer …, 2007 - content.iospress.com
Ad hoc environments are subject to tight security and architectural constraints, which call for
distributed, adaptive, robust and efficient solutions. In this paper we propose a distributed …

Towards secure resource sharing for impromptu collaboration in pervasive computing

W Claycomb, D Shin - Proceedings of the 2007 ACM symposium on …, 2007 - dl.acm.org
Access control in mobile and pervasive computing is a complex issue, with many aspects
relating to the establishment, management, and enforcement of methods and policies that …

A security policy system for mobile autonomic networks

M Aljnidi, J Leneutre - 1st International ICST Conference on Autonomic …, 2007 - eudl.eu
An autonomic security system is indispensable for the operation of an autonomic network.
Policies are basic stones in building autonomic systems. In this paper, we introduce our …

[PDF][PDF] Trust and the establishment of ad-hoc communities

SL Keoh, E Lupu - 2nd Internal iTrust Workshop on Trust Management in …, 2003 - Citeseer
The proliferation of computing devices, which are being progressively embedded in the
objects of everyday life, gives rise to numerous interactions and “collaborations” between …

Adaptive access control in coordination-based mobile agent systems

C Julien, J Payton, GC Roman - … Engineering for Multi-Agent Systems III …, 2005 - Springer
The increased pervasiveness of mobile devices like cell phones, PDAs, and laptops draws
attention to the need for coordination among these networked devices. The very nature of …

[PDF][PDF] A platform for leveraging blockchain technology for the storage, issuance and authentication of academic credentials

K Batzavalis, R Bala, A Norta, O Norta Partners - 2021 - icobliss.com
Academic credential verification is a critical process that almost all individuals have to go
through at some point in their lives. Proving the validity of one's academic qualification is not …