نشرت في: July 2008
Time synchronization is critical in sensor networks at many layers of their design. It enables better duty-cycling of the radio, accurate and secure...
نشرت في: October 2008
Despite their widespread adoption, Role-based Access Control (RBAC) models exhibit certain shortcomings that make them less than ideal for deployment...
Secure bootstrapping ofmobile ad hoc networks (MANETs) is a challenging problem in scenarios in which network users (or nodes) do not share trust rel...
We construct two new multiparty digital signature schemes that allow multiple signers to sequentially and non-interactively produce a compact, fixed-...
In this article we develop a novel graph-based approach toward network forensics analysis. Central to our approach is the evidence graph model that f...