An ad hoc or sensor network that is employed for security sensitive applications is expected to tolerate a certain quantity of maliciously behaving nodes. Algorithms must be desig...
The network is becoming more and more versatile because of the variety of the computing resources and the communication technologies that have become available. The mobility of the...
Abstract— Social networking is increasingly becoming a popular means of communication for online users. The trend is also true for offline scenarios where people use their mobil...
Mobile ad hoc network (MANET) has been generally regarded as an ideal network model for group communications because of its specialty of instant establishment. However, the securit...
Securing ad hoc networks in a fully self-organized way is effective and light-weight, but fails to accomplish trust initialization in many trust deficient scenarios. To overcome t...
Kui Ren, Tieyan Li, Zhiguo Wan, Feng Bao, Robert H...