Web applications are becoming the dominant way to provide access to on-line services. At the same time, web application vulnerabilities are being discovered and disclosed at an al...
A great challenge in securing sensor networks is that sensor nodes can be physically compromised. Once a node is compromised, attackers can retrieve secret information (e.g. keys)...
In a mobile ad hoc network (MANET), a source node must rely on intermediate nodes to forward its packets along multihop routes to the destination node. Due to the lack of infrastr...
Charikleia Zouridaki, Brian L. Mark, Marek Hejmo, ...
Introducing mobile data sinks into wireless sensor networks (WSNs) improves the energy efficiency and the network lifetime, and is demanded for many application scenarios, such a...
The Internet consists of thousands of independent domains with different, and sometimes competing, business interests. However, the current interdomain routing protocol (BGP) limi...