— File distribution via network coding has received a lot of attention lately. However, direct application of network coding may have security problems. In particular, attackers ...
Currently, there is a strong effort of the research community in rethinking the Internet architecture to cope with its current limitations and support new requirements. Many resea...
Natalia Castro Fernandes, Marcelo D. D. Moreira, I...
— In this paper, we address the problem of cross-layer denial of service attack in wireless data networks. We introduce SPREAD - a novel adaptive diversification approach to pro...
A group key agreement protocol (GKA) allows a set of players to establish a shared secret key which can be used to secure a subsequent communication. Several efficient constantrou...
Sensor networks are deployed to monitor the surroundings and keep the end-user informed about the events witnessed. Different types of events have different levels of importance f...