Learn More
The past few years have witnessed an explosive growth in the use of wireless mobile handheld devices as the enabling technology for accessing Internet-based services, as well as for personal communication needs in ad hoc networking environments. Most studies indicate that it is impossible to utilize strong cryptographic functions for implementing security(More)
The idea of electronic cash, as a payment instrument is appealing, but has yet to be widely deployed commercially. We outline the properties of two major approaches to the provision of electronic cash, and discuss their strengths and weaknesses. We then propose a new scheme based on secret splitting that allows for off-line spending of coins with a tailored(More)
As business is moving from face-to-face trading, mail order, and telephone order to electronic commerce over open networks such as the Internet, crucial security issues are being raised. Whereas Electronic Funds Transfer over financial networks is reasonably secure, securing payments over open networks connecting commercial servers and consumer workstations(More)
A mobile ad hoc network is a collection of nodes that are connected through a wireless medium and form rapidly changing topologies. The widely accepted existing routing protocols designed to accommodate the needs of such self-organised networks do not address possible threats aimed at the disruption of the protocol itself. The assumption of a trusted(More)
The dynamic nature of Ad hoc Networks makes it difficult to build trust relationships. This is primarily due to non-availability of online trusted third parties during trust negotiation. Trust Negotiations should also be secure and straightforward. This paper presents an overview of a scheme for progressive trust negotiation to build trust, along with a(More)
Mobile ad hoc are gaining popularity because of availability of low cost mobile devices and its ability to provide instant wireless networking capabilities where implementation of wired network is not possible or costly. MANETs are vulnerable to various types of attack because of its features like continuous changing topology, resource constraints and(More)