• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 38
Next 10 →

CMU-CyLab-08-007

by Chia-hsin Chen, Chung-wei Chen, Cynthia Kuo, Yan-hao Lai, Jonathan M. Mccune, Ahren Studer Adrian Perrig , 2008
"... Mobile users share the same expectations as wired users: they want to communicate with other people, they ex-pect the communication to be secure, and it should all be easy. However, mobility poses many challenges for security. Communication is often ad hoc, and the infras-tructure may be untrusted. ..."
Abstract - Add to MetaCart
Mobile users share the same expectations as wired users: they want to communicate with other people, they ex-pect the communication to be secure, and it should all be easy. However, mobility poses many challenges for security. Communication is often ad hoc, and the infras-tructure may be untrusted. Secure communication relies on the distribution of au-thentic information among the communicating parties’ devices. This is a challenging problem because devices generally do not share pre-existing secrets. Current secu-rity protocols for distributing initial authentic informa-tion fail to consider the human element. Many protocols do not scale beyond a pair of devices, although people often need to communicate with a group. The few exist-ing group protocols assume that users will always count the number of members and verify the list of members correctly. However, as group size increases, implemen-tations of these protocols become more prone to human error. We present GAnGS, a fully-implemented system for exchanging authentic information between mobile de-vices when they are physically present in the same lo-cation. GAnGS is scalable, appropriate for two or more devices. We implement two user-friendly variants of GAnGS on Nokia N70 camera phones. The first vari-ant, GAnGS-P, is based on an untrusted communication hub. The second variant, GAnGS-T, needs no infrastruc-ture. Both variants use Bluetooth for peer-to-peer wire-less communication during the information exchange. 1

Taipei TW

by Chia-hsin Owen Chen, Chung-wei Chen, Cynthia Kuo, Yan-hao Lai, Jonathan M. Mccune, National Tsing Hua, Taichung Tw
"... Establishing secure communication among a group of physically collocated people is a challenge. This problem can be reduced to establishing authentic public keys among all the participants – these public keys then serve to establish a shared secret symmetric key for encryption and authentication of ..."
Abstract - Add to MetaCart
Establishing secure communication among a group of physically collocated people is a challenge. This problem can be reduced to establishing authentic public keys among all the participants – these public keys then serve to establish a shared secret symmetric key for encryption and authentication of messages. Unfortunately, in most real-world settings, public key infrastructures (PKI) are uncommon and distributing a secret in a public space is difficult. Thus, it is a challenge to exchange authentic public keys in a scalable, secure, and easy to use fashion. In this paper, we propose GAnGS, a protocol for the secure exchange of authenticated information among a group of people. In contrast to prior work, GAnGS resists Groupin-the-Middle and Sybil attacks by malicious insiders, as well as infiltration attacks by malicious bystanders. GAnGS is designed to be robust to user errors, such as miscounting the number of participants or incorrectly comparing checksums. We have implemented and evaluated GAnGS on Nokia N70 phones. The GAnGS system is viable and achieves a good balance between scalability, security, and ease of use.

unknown title

by Helena Susana, Afonso Alves, Helena Susana, Afonso Alves , 2011
"... Corporate Governance determinants of voluntary disclosure and its effects on information asymmetry: an analysis for Iberian Peninsula listed companies. ..."
Abstract - Add to MetaCart
Corporate Governance determinants of voluntary disclosure and its effects on information asymmetry: an analysis for Iberian Peninsula listed companies.

BDRS PRICE DESCRIPTOR,

by unknown authors
"... This report focuses on the evidence about the health.consequences of smoking for women, and is intended to serve.the public health and medical communities as 'a unified source of existing scientific research. The major issues about tobacco use and women's health are examined, including tre ..."
Abstract - Add to MetaCart
This report focuses on the evidence about the health.consequences of smoking for women, and is intended to serve.the public health and medical communities as 'a unified source of existing scientific research. The major issues about tobacco use and women's health are examined, including

Wireless Sensor Networking in Challenging Environments

by Mo Sha, Raj Jain, Jonathan Turner, Guoliang Xing, Mo Sha , 2014
"... This Dissertation is brought to you for free and open access by Washington University Open Scholarship. It has been accepted for inclusion in All Theses and Dissertations (ETDs) by an authorized administrator of Washington University Open Scholarship. For more information, please contact ..."
Abstract - Add to MetaCart
This Dissertation is brought to you for free and open access by Washington University Open Scholarship. It has been accepted for inclusion in All Theses and Dissertations (ETDs) by an authorized administrator of Washington University Open Scholarship. For more information, please contact

1 MOSES: a Framework for QoS Driven Runtime Adaptation of Service-oriented Systems

by Valeria Cardellini, Emiliano Casalicchio, Vincenzo Grassi, Stefano Iannucci, Francesco Lo Presti, Raffaela Mir
"... Abstract—Architecting software systems according to the serviceoriented paradigm, and designing runtime self-adaptable systems are two relevant research areas in today’s software engineering. In this paper we address issues that lie at the intersection of these two important fields. First, we presen ..."
Abstract - Add to MetaCart
Abstract—Architecting software systems according to the serviceoriented paradigm, and designing runtime self-adaptable systems are two relevant research areas in today’s software engineering. In this paper we address issues that lie at the intersection of these two important fields. First, we

List of Tables...........................

by Catherine Rose, Mills Olschanowsky, Catherine Rose, Mills Olschanowsky , 2011
"... by ..."
Abstract - Add to MetaCart
Abstract not found

© Author(s) 2015. CC Attribution 3.0 License.

by T. J. Troy, M. Konar, V. Srinivasan, S. Thompson , 2015
"... www.hydrol-earth-syst-sci.net/19/3667/2015/ doi:10.5194/hess-19-3667-2015 ..."
Abstract - Add to MetaCart
www.hydrol-earth-syst-sci.net/19/3667/2015/ doi:10.5194/hess-19-3667-2015

SIMULATION, DEVELOPMENT AND DEPLOYMENT OF MOBILE WIRELESS SENSOR NETWORKS FOR MIGRATORY BIRD TRACKING

by Bird Tracking, William P. Bennett, William P., Development, Deployment Of, Mobile Wireless Sensor, William P. Bennett, William P. Bennett, Adviser Mehmet, C. Vuran , 2012
"... This thesis presents CraneTracker, a multi-modal sensing and communication system for monitoring migratory species at the continental level. By exploiting the robust and extensive cellular infrastructure across the continent, traditional mobile wireless sensor networks can be extended to enable reli ..."
Abstract - Add to MetaCart
This thesis presents CraneTracker, a multi-modal sensing and communication system for monitoring migratory species at the continental level. By exploiting the robust and extensive cellular infrastructure across the continent, traditional mobile wireless sensor networks can be extended to enable reliable, low-cost monitoring of migratory species. The developed multi-tier architecture yields ecologists with unconventional behavior in-formation not furnished by alternative tracking systems at such a large scale and for a low-cost. The simulation, development and implementation of the CraneTracker soft-ware system is presented. The system is shown effective through multiple proxy deploy-

hardware and mobile web technology Master of Science Thesis in Programme Computer Systems and Networks

by Tomas Ohlson, Tomas Ohlson , 2013
"... Digitising statistics handling through ..."
Abstract - Add to MetaCart
Digitising statistics handling through
Next 10 →
Results 1 - 10 of 38
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University