2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA) (2006)
Apr. 18, 2006 to Apr. 20, 2006
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/AINA.2006.276
Ahmad-Reza Sadeghi , Ruhr-University of Bochum, Germany
Mark Manulis , Ruhr-University of Bochum, Germany
Intelligent security protocols can verify whether the involved principals have properties that are defined based on certain functional and security policies. The property we focus on is the performance of mobile devices participating in a security protocol. In this context, the protocol should distribute the computation, communication and storage costs fairly among all devices. However, the protocol should foresee against cheating participants who may lie about their properties to gain advantage.
Ahmad-Reza Sadeghi, Mark Manulis, "Property-Based Taming of Lying Mobile Nodes", 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA), vol. 02, no. , pp. 476-480, 2006, doi:10.1109/AINA.2006.276