Multihop wireless mesh networks (WMNs) are finding ever-growing acceptance as a viable and effective solution to ubiquitous broadband Internet access. This paper addresses the secu...
Nearly 70% of information security threats originate from inside the organization. The instances of insider threats have been increasing at an alarming rate with the latest trends ...
Abstract. Many ad hoc routing algorithms rely on broadcast flooding for location discovery or, more generally, for secure routing applications. Flooding is a robust algorithm but ...
On a wired network, physical authentication is implicitly provided by access: if a user is able to plug a cable into a network socket, he must have cleared other security checks s...
—We study a new application of threshold-based secret sharing in a distributed online social network (DOSN), where users need a means to back up and recover their private keys in...
Le-Hung Vu, Karl Aberer, Sonja Buchegger, Anwitama...