Abstract—In this paper, we explore the feasibility of vehicleto-vehicle (V2V) secure communication using public key cryptography. We implement a prototype and test it extensively...
Juhong Min, Jihun Ha, Sangki Yun, Inhye Kang, Hyog...
To increase the lifetime of the sensor networks, a recognized method is to switch off/on some sensor nodes between “sleep” and “activity” mode in order to save the energy....
Application-level multicast systems are vulnerable to attacks that impede nodes from receiving desired data. Live streaming protocols are especially susceptible to packet loss ind...
— A fully embedded tactile/force sensor system to be installed on the phalanges of a robot hand is presented in this paper. The sensor consists of a distributed array of analog t...
We analyze the problem of efficient distributed storage of information in a message-passing environment where both less than one third of the servers, as well as an arbitrary num...