Path-quality monitoring in the presence of adversaries
SIGMETRICS '08 Proceedings of the 2008 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Authenticated wireless roaming via tunnels: making mobile guests feel at home
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
An intensive survey of fair non-repudiation protocols
Computer Communications
Hi-index | 0.00 |
Three-party tunnel-based roaming infrastructures may become a future trend to permit mobile users to connect to the Internet when they are not at home. Those solutions takle security issues for both visited networks and mobile users, but require an efficient and scalable accounting protocol. In this paper, we present a lightweight accounting protocol in which the quantity of data that the mobile is allowed to send is gradually increased when cryptographically signed receipts are received.