—In an adversarial environment, various kinds of security attacks become possible if malicious nodes could claim fake locations that are different from where they are physically ...
The emerging ubiquitous computing vision is characterized by decentralized and ad hoc interoperation among devices and networks for access to services. Interacting devices or grou...
Venkatraman Ramakrishna, Kevin Eustice, Peter L. R...
Deniable authentication is a technique that allows one party to send messages to another while the latter can not prove to a third party the fact of communication. In this paper, w...
Sensor networks are deployed to monitor the physical environment in public and vulnerable locations. It is not economically viable to house sensors in tamper-resilient enclosures ...
Malicious mass-mailing activity on the Internet is a serious and continuing threat that includes mass-mailing worms, spam, and phishing. A mechanism commonly used to deliver such ...
David Whyte, Paul C. van Oorschot, Evangelos Krana...