• Publications
  • Influence
Key agreement in ad hoc networks
We encounter new types of security problems in ad hoc networks because such networks have little or no support infrastructure. Expand
Applicability of identity-based cryptography for disruption-tolerant networking
Traditional approaches for communication security do not work well in disruption- and delay-tolerant networks (DTNs). Recently, the use of identity-based cryptography (IBC) has been proposed as oneExpand
NRC-TR-2007-007 Towards Securing Disruption-Tolerant Networking
Most of the existing Internet applications are built on the assumption of immediate end-to-end connectivity. However, there are many scenarios, like messaging in sparsely populated areas, in whichExpand
Extending cellular authentication as a service
Enterprising service providers keep dreaming up and deploying exciting new services. But every time you sign up to such a service, chances are that you have to pick and remember a username andExpand
Controlling resource hogs in mobile delay-tolerant networks
We use a basic technique based on coarse-grained priority classes. Expand
Track Me If You Can: On the Effectiveness of Context-based Identifier Changes in Deployed Mobile Networks
In this paper, we evaluate in a real-life setting the effectiveness of standard mix-zone-based privacy protection mechanisms against probabilistic tracking attacks. Expand
Cellular Authentication for Mobile and Internet Services
An invaluable reference discussing the Generic Authentication Architecture (GAA), its infrastructure, usage and integration into existing networksCellular Authentication for Mobile and InternetExpand
Security for Interactions in Pervasive Networks: Applicability of Recommendation Systems
We investigate the features present in these networks that could be used to mitigate risk and present existing research in the areas of ad hoc network security and distributed recommendation systems, discussing their potential for solving these problems. Expand
Privacy of the long-term identities in cellular networks
Identity and location privacy are of particular interest for mobile devices because people typically carry their mobile phone all the time and they also use the same device for a long time. Expand
Defeating the Downgrade Attack on Identity Privacy in 5G
We propose to use an existing pseudonym-based solution to protect user identity privacy of 5G user equipment against IMSI catchers in LTE and include a mechanism for updating LTE pseudonyms in the public key encryption based 5G identity privacy procedure. Expand