In this paper we present SECTOR, a set of mechanisms for the secure verification of the time of encounters between nodes in multi-hop wireless networks. This information can be u...
Abstract. Recently, methods from provable security, that had been developped for the last twenty years within the research community, have been extensively used to support emerging...
Department of Defense and Homeland Security analysts are increasingly using multi-agent simulation (MAS) to examine national security issues. This paper summarizes three MAS natio...
Thomas W. Lucas, Susan M. Sanchez, Felix Martinez,...
Pervasive computing applications involve information flow across multiple organizations. Thus, any security breach in an application can have far-reaching consequences. However, ef...
A fairly common modern setting entails users, each in possession of a personal wireless device, wanting to communicate securely, via their devices. If these users (and their devic...