The deployment of sensor networks in security- and safety-critical environments requires secure communication primitives. In this paper, we design, implement, and evaluate a new s...
Bryan Parno, Mark Luk, Evan Gaustad, Adrian Perrig
Exchange of private information content among a large number of users via E-mail List Services is becoming increasingly common. In this paper we address security requirements in t...
In the course of making electronic services and facilities more widely accessible and usable, more and more IT systems are incorporating smart cards as a component. We analyzes the...
—Wireless Mesh Network (WMN) is a promising broadband wireless network architecture. Security is an important component of the WMN architecture but is not fully considered so far...
Donglai Sun, Yue Wu, Tian Wu, Yang Liu, Ning Liu, ...
While a variety of mechanisms have been developed for securing individual intra-domain protocols, none address the issue in a holistic manner. We develop a unified framework to sec...