Recent trend in the development of mobile devices, wireless communications, sensor technologies, weblogs, and peer-to-peer communications have prompted a new design opportunity fo...
Efficient and fair resource allocation associated with congestion control in multi-hop cognitive radio networks (CRN) is a challenging problem. In this paper, we consider their mu...
We show how to design secure authentication protocols for a non-standard class of scenarios. In these authentication is not bootstrapped from a PKI, shared secrets or trusted thir...
—In online social networks (OSNs), user connections can be represented as a network. The network formed has distinct properties that distinguish it from other network topologies....
Ankush Garg, Prantik Bhattacharyya, Charles U. Mar...
Abstract— The pre-shared key based mechanisms for Transport Layer Security (TLS) were recently standardized by the IETF to extend the set of ciphersuites by utilizing existing ke...
Fang-Chun Kuo, Hannes Tschofenig, Fabian Meyer, Xi...