Research in the concurrency control of real-time data access over mobile networks is receiving growing attention. With possibly lengthy transmission delay and frequent disconnecti...
Secure communication guaranteeing reliability, authenticity, and privacy in sensor networks with active adversaries is a challenging research problem since asymmetric key cryptosy...
In peer-to-peer networks, it is very difficult to route query successfully, since nodes in the routing path do not always behave according to pre-established routing protocols. To...
abstract February 6, 2004 Security protocols typically employ an authentication phase followed by a protected data exchange. In some cases, such TLS, these two phases are tightly ...
Abstract. In this paper, we classify the RFID distance bounding protocols having bitwise fast phases and no final signature. We also give the theoretical security bounds for two s...