In a mobile ad hoc network (MANET), a source node must rely on intermediate nodes to forward its packets along multihop routes to the destination node. Due to the lack of infrastr...
Charikleia Zouridaki, Brian L. Mark, Marek Hejmo, ...
—Cyber attack behavior analysis can be roughly classified as “network centric” and “attacker centric” approaches. Compared with traditional “network centric” approach...
Cross-site scripting (XSS) is an attack against web applications in which scripting code is injected into the output of an application that is then sent to a user’s web browser....
Philipp Vogt, Florian Nentwich, Nenad Jovanovic, E...
—This paper discusses the design and implementation of an ultra low power embedded GPS receiver node for use in remote monitoring situations where battery life is of the utmost i...
An aggregate signature scheme is a digital signature scheme where anyone given n signatures on n messages from n users can aggregate all these signatures into a single short signa...