Abstract. In sensor networks, correct clocks have arbitrary starting offsets and nondeterministic fluctuating skews. We consider an adversary that aims at tampering with the cloc...
Jaap-Henk Hoepman, Andreas Larsson, Elad Michael S...
In this work we address the problem of boundary detection by combining ideas and approaches from biological and computational vision. Initially, we propose a simple and efficient ...
Iasonas Kokkinos, Rachid Deriche, Olivier D. Fauge...
Denial of Service (DoS) attacks are a virulent type of attack on the availability of networks’ intended services and resources. Defense against DoS attacks has been built into th...
—Distributed Denial-of-Service (DDoS) attacks have become a major threat to the Internet. As a countermeasure against DDoS attacks, IP traceback schemes identify the network path...
— We address the problem of secure location determination, known as Secure Localization, and the problem of verifying the location claim of a node, known as Location Verificatio...