ACM Transactions on Computer Systems (TOCS)
Fundamentals of computer security technology
Fundamentals of computer security technology
A new family of authentication protocols
ACM SIGOPS Operating Systems Review
An architecture for a secure service discovery service
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
The design and implementation of an intentional naming system
Proceedings of the seventeenth ACM symposium on Operating systems principles
Proxy-based security protocols in networked mobile devices
Proceedings of the 2002 ACM symposium on Applied computing
Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems
Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations
Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations
IEEE Internet Computing
A Privacy Awareness System for Ubiquitous Computing Environments
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
INS/Twine: A Scalable Peer-to-Peer Architecture for Intentional Resource Discovery
Pervasive '02 Proceedings of the First International Conference on Pervasive Computing
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
Home networking with Universal Plug and Play
IEEE Communications Magazine
A software-based trust framework for distributed industrial management systems
Journal of Systems and Software
Trust model for certificate revocation in ad hoc networks
Ad Hoc Networks
Hi-index | 0.00 |
Securely accessing unfamiliar services in public environments using ad hoc wireless networks is challenging. We present a proxy-based approach that uses alternative network channels to establish a secure trust relationship between communication parties to facilitate ad hoc wireless communications. Based on a service discovery protocol, our models achieve secure, trusted, anonymous, efficient, and economical communications between unfamiliar parties. Our protocol design is formally verified using BAN logic.