Distance-bounding protocols aim to prevent an adversary from pretending that two parties are physically closer than they really are. We show that proposed distance-bounding protoco...
Jolyon Clulow, Gerhard P. Hancke, Markus G. Kuhn, ...
: Wireless Sensor Networks (WSN) pose a need for dynamically establishing a secret key joint to a group of nodes. Elliptic Curve Cryptography (ECC) has emerged as a suitable public...
—Receiver-location privacy is an important security requirement in privacy-preserving Vehicular Ad hoc Networks (VANETs), yet the unavailable receiver’s location information ma...
The X-Bone dynamically deploys and manages Internet overlays to reduce con®guration eort and increase network component sharing. The X-Bone discovers, con®gures, and monitors ...
Abstract— The Virtual Node Layer (VNLayer) is a programtraction for Mobile Ad Hoc Networks (MANETs). It defines simple virtual servers at fixed locations in a network, addressi...
Jiang Wu, Nancy D. Griffeth, Nancy A. Lynch, Calvi...