Location-aware security services for wireless sensor networks using network coding Read more about Location-aware security services for wireless sensor networks using network coding
Efficient broadcast authentication for wireless sensor networks Read more about Efficient broadcast authentication for wireless sensor networks
Using node accountability in credential based routing for mobile ad-hoc networks Read more about Using node accountability in credential based routing for mobile ad-hoc networks
AuCRB: an efficient mechanism to provide availability, reliability and authentication for multihop broadcasting in wireless networks Read more about AuCRB: an efficient mechanism to provide availability, reliability and authentication for multihop broadcasting in wireless networks
An iterative algorithm for trust and reputation management Read more about An iterative algorithm for trust and reputation management
Trust management and adversary detection for delay tolerant networks Read more about Trust management and adversary detection for delay tolerant networks
Design Principles for Secure Wireless Sensor Networks: Key Management Schemes and Malicious Attacks Read more about Design Principles for Secure Wireless Sensor Networks: Key Management Schemes and Malicious Attacks
A protocol for data availability in Mobile Ad-Hoc Networks in the presence of insider attacks Read more about A protocol for data availability in Mobile Ad-Hoc Networks in the presence of insider attacks
A belief propagation based recommender system for online services Read more about A belief propagation based recommender system for online services
Secure, intuitive and low-cost device authentication for smart grid networks Read more about Secure, intuitive and low-cost device authentication for smart grid networks