Moloney et al., 2004 - Google Patents
Security for interactions in pervasive networks: Applicability of recommendation systemsMoloney et al., 2004
- Document ID
- 6800018595871213625
- Author
- Moloney S
- Ginzboorg P
- Publication year
- Publication venue
- European Workshop on Security in Ad-hoc and Sensor Networks
External Links
Snippet
Recent growth in the sales of Bluetooth-enabled handsets allows short-lived automated interactions between personal devices to become popular outside the research laboratories. In these new kinds of networks, automated data transfer between devices can now be …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/02—Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/30—Network-specific arrangements or communication protocols supporting networked applications involving profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/28—Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/06—Selective distribution or broadcast application services; Mobile application services to user groups; One-way selective calling services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/02—Network-specific arrangements or communication protocols supporting networked applications involving the use of web-based technology, e.g. hyper text transfer protocol [HTTP]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/22—Tracking the activity of the user
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/16—Service discovery or service management, e.g. service location protocol [SLP] or Web services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/18—Network-specific arrangements or communication protocols supporting networked applications in which the network application is adapted for the location of the user terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W76/00—Connection management, e.g. connection set-up, manipulation or release
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Iqbal et al. | Exploring sybil and double-spending risks in blockchain systems | |
| Heiss et al. | From oracles to trustworthy data on-chaining systems | |
| Jesus et al. | A survey of how to use blockchain to secure internet of things and the stalker attack | |
| Rawat et al. | Smart cities cybersecurity and privacy | |
| Hammi et al. | Bubbles of Trust: A decentralized blockchain-based authentication system for IoT | |
| Rahman et al. | Blockchain-based access control management for decentralized online social networks | |
| Torres et al. | A survey on identity management for the future network | |
| US20070106892A1 (en) | Method and system for establishing a communication using privacy enhancing techniques | |
| Rodrigues et al. | Blockchain signaling system (BloSS): cooperative signaling of distributed denial-of-service attacks | |
| Seigneur | Trust, security and privacy in global computing | |
| Kumar et al. | Ultra-lightweight blockchain-enabled RFID authentication protocol for supply chain in the domain of 5G mobile edge computing | |
| Voss et al. | A privacy preserving reputation system for mobile information dissemination networks | |
| Ahmad et al. | Moving beyond the crypto-currency success of blockchain: A systematic survey | |
| Seigneur et al. | Trust enhanced ubiquitous payment without too much privacy loss | |
| Chandrakar et al. | Blockchain based security protocol for device to device secure communication in internet of things networks | |
| Moloney et al. | Security for interactions in pervasive networks: Applicability of recommendation systems | |
| Kuntze et al. | Trusted ticket systems and applications | |
| Magaia et al. | Security in delay-tolerant mobile cyber physical applications | |
| Shashidhara et al. | Nextgen authentication: A secure blockchain-based protocol for content-centric networks with soulbound tokens | |
| Bezahaf et al. | Bcwan: A federated low-power wan for the internet of things (industry track) | |
| Hadi et al. | A vision of blockchain technology and its integration with IOT: Applications, challenges, and opportunities; from the authentication perspective | |
| Dastagir et al. | A Smart Card based Approach for Privacy Preservation Authentication of Non-Fungible Token using Non-Interactive Zero Knowledge Proof | |
| Conrad et al. | A peer-to-peer framework for electronic markets | |
| Asokan et al. | Issues in initializing security | |
| Osman | A trading model and security regime for mobile e-commerce via ad hoc wireless networking |