LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Michalas, A.; Bakopoulos, M.; Komninos, N.; Prasad Neeli, R. (2012)
Publisher: IEEE
Languages: English
Types: Unknown
Subjects: UOWSAT, QA76
In this paper we propose SETS, a protocol with main aim to provide secure and private communication during emergency situations. SETS achieves security of the exchanged information, attack resilience and user’s privacy. In addition, SETS can be easily adapted for mobile devices, since field experimental results show the effectiveness of the protocol on actual smart-phone platforms.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • [1] Timothy E. Levin, Cynthia E. Irvine, Terry V. Benzel, Thuy D. Nguyen, Paul C. Clark and G. Bhaskara. Idea: Trusted Emergency Management. In Engineering Secure Software and Systems, First International Symposium ESSoS 2009, Leuven, Belgium, February 4-6, 2009. Proceedings. Springer, 2009.
    • [2] F. Dotzer, F. Kohlmayer, T. Kosch and M. Strassberger. Secure Communication for Intersection Assistance. WIT 2005: 2nd International Workshop on Intelligent Transportation, 2006.
    • [3] Xiangxi Li, Yu Zhang and Yuxin Deng. Verifying Anonymous Credential Systems in Applied Pi Calculus. In Proceedings of the 8th International Conference on Cryptology and Network Security (CANS '09), SpringerVerlag, Berlin, Heidelberg, pp. 209-225, 2009.
    • [4] A. Lysyanskaya, R. L. Rivest and A. Sahai. Pseudonym Systems (Extended Abstract). In Selected Areas in Cryptography, pp. 184-199, 1999.
    • [5] I. B. Damgard. Payment Systems and Credential Mechanisms with Provable Security Against Abuse by Individuals (Extended Abstract). In Advances in Cryptology-Crypto' 88, pp. 328-355, Springer-Verlag, 1988.
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article