In Mobile Ad hoc Networks (MANET), various types of Denial of Service Attacks (DoS) are possible because of the inherent limitations of its routing protocols. Considering the Ad h...
Dhaval Gada, Rajat Gogri, Punit Rathod, Zalak Dedh...
The architecture of two-tiered sensor networks, where storage nodes serve as an intermediate tier between sensors and a sink for storing data and processing queries, has been widel...
Abstract— This paper experimentally investigates the feasibility of crypto-free communications in resource-constrained wireless sensor networks. We exploit the spatial signature ...
Abstract. We propose a micro-payment scheme for symmetric multihop cellular networks that encourages intermediaries to transmit packets and recipients to provide auditing informati...
In this paper we study the substitution-permutation network (SPN) on which AES is based. We introduce AES∗ , a SPN identical to AES except that fixed S-boxes are replaced by ran...