Abstract. This paper describes security protocols that use anonymous channels as primitive, much in the way that key distribution protocols take encryption as primitive. This abstraction allows us to focus on high level anonymity goals of these protocols much as abstracting away from encryption claries and emphasizes high level security goals of key distri-bution protocols. The contributions of this paper are (1) a notation for describing such protocols, and (2) two protocols for location protected communication over a public infrastructure.
Even as wireless networks create the potential for access to information from mobile platforms, they...
[[abstract]]In this paper, the authors shall propose a new anonymous channel protocol for wireless c...
Wireless communications are being driven by the need for providing network access to mobile or nomad...
This thesis summarizes an existing protocol, that we have chosen to call the Token Key Agreement pro...
Mobile code technology offers interesting possibilities to the practitioner, but also raises strong ...
Mobile code technology offers interesting possibilities to the practitioner, but also raises strong ...
In a mobile computing environment, it is desirable to protect information about the movements and ac...
This thesis has been submitted in partial fulfillment of requirements for an advance
Abstract—Location privacy of mobile users (MUs) in wireless communication networks is very important...
The increasing heterogeneity of communicating devices, ranging from resource constrained battery dri...
The growth of mobile communications systems over the past decade indicates a trend towards an always...
Abstract Mobile IP enables a mobile node (MN) to move around without losing their transport-layer c...
The amount of mobile and nomadic computing is expected to increase dramatically in the near future. ...
Abstract — In this paper, we first define the requirements on anonymity and security properties of t...
Privacy in mobile ad hoc networks has new semantics in addition tothe conventional notions for infra...
Even as wireless networks create the potential for access to information from mobile platforms, they...
[[abstract]]In this paper, the authors shall propose a new anonymous channel protocol for wireless c...
Wireless communications are being driven by the need for providing network access to mobile or nomad...
This thesis summarizes an existing protocol, that we have chosen to call the Token Key Agreement pro...
Mobile code technology offers interesting possibilities to the practitioner, but also raises strong ...
Mobile code technology offers interesting possibilities to the practitioner, but also raises strong ...
In a mobile computing environment, it is desirable to protect information about the movements and ac...
This thesis has been submitted in partial fulfillment of requirements for an advance
Abstract—Location privacy of mobile users (MUs) in wireless communication networks is very important...
The increasing heterogeneity of communicating devices, ranging from resource constrained battery dri...
The growth of mobile communications systems over the past decade indicates a trend towards an always...
Abstract Mobile IP enables a mobile node (MN) to move around without losing their transport-layer c...
The amount of mobile and nomadic computing is expected to increase dramatically in the near future. ...
Abstract — In this paper, we first define the requirements on anonymity and security properties of t...
Privacy in mobile ad hoc networks has new semantics in addition tothe conventional notions for infra...
Even as wireless networks create the potential for access to information from mobile platforms, they...
[[abstract]]In this paper, the authors shall propose a new anonymous channel protocol for wireless c...
Wireless communications are being driven by the need for providing network access to mobile or nomad...