Recently, identity-based cryptographic (IBC) schemes have been considered to secure mobile ad hoc networks (MANETs) due to their efficient key management properties. However, propo...
As the requirements on high-availability for multimedia intensified new applications increase the pressure for the higher bandwidth on wireless networks, just upgrading to the high...
Jong-Hyouk Lee, Byungchul Park, Hyunseung Choo, Ta...
— Node compromise is a serious threat in wireless sensor networks, as it enables an adversary to perform various attacks. Many security schemes exploit the redundancy of many wir...
Abstract—In this paper, to improve the performance of multihop wireless networks, we explore a cross layer multirate adaptation scheme (we call it CROMA) that uses the phenomenon...
Trusted computing (e.g. TCPA and Microsoft’s NextGeneration Secure Computing Base) has been one of the most talked about and least understood technologies in the computing commu...