20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06) (2006)
Apr. 18, 2006 to Apr. 20, 2006
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/AINA.2006.276
Mark Manulis , Ruhr-University of Bochum, Germany
Ahmad-Reza Sadeghi , Ruhr-University of Bochum, Germany
Intelligent security protocols can verify whether the involved principals have properties that are defined based on certain functional and security policies. The property we focus on is the performance of mobile devices participating in a security protocol. In this context, the protocol should distribute the computation, communication and storage costs fairly among all devices. However, the protocol should foresee against cheating participants who may lie about their properties to gain advantage.
Mark Manulis, Ahmad-Reza Sadeghi, "Property-Based Taming of Lying Mobile Nodes", 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06), vol. 02, no. , pp. 476-480, 2006, doi:10.1109/AINA.2006.276