Handbook of Applied Cryptography
Handbook of Applied Cryptography
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
Bluetooth: vision, goals, and architecture
ACM SIGMOBILE Mobile Computing and Communications Review
Hi-index | 0.00 |
Problems with securing ad hoc services are discussed. How authentication and key exchange for ad hoc services can be performed will be shown. We use a simple trust model for the participants in an ad hoc network. We show how to create an authenticated secure ad hoc connection using, for example, the Java/Jini environment.