Device attestation is an essential feature in many security protocols and applications. The lack of dedicated hardware and the impossibility to physically access devices to be att...
An untraceable fair network payment protocol is proposed by Wang in Asiacrypt’03, which employs the existent techniques of the offline untraceable cash and a new technique calle...
—Due to the unattended nature of wireless sensor networks, an adversary can easily capture and compromise sensor nodes, generate replicas of those compromised nodes, and mount a ...
Jun-Won Ho, Donggang Liu, Matthew Wright, Sajal K....
Denial of Service (DoS) attacks are a virulent type of attack on the availability of networks’ intended services and resources. Defense against DoS attacks has been built into th...
Because of cost and resource constraints, sensor nodes do not have a complicated hardware architecture or operating system to protect program safety. Hence, the notorious buffer-o...