—Our study on the deployment topology and communication characteristics of wireless mesh enterprise networks (WMENs) leads to three critical security challenges: (a) deployment o...
Md. Abdul Hamid, Md. Shariful Islam, Choong Seon H...
Wireless communication enables a broad spectrum of applications, ranging from commodity to tactical systems. Neighbor discovery (ND), that is, determining which devices are within...
Marcin Poturalski, Panos Papadimitratos, Jean-Pier...
Abstract—An overview of recent advances in secure peerto-peer networking is presented, toward enforcing data integrity, confidentiality, availability, and access control policie...
Problems of secure communication and computation have been studied extensively in network models. Goldreich, Goldwasser, and Linial, Franklin and Yung, and Franklin and Wright have...
Monitoring host behavior in a network is one of the most essential tasks in the fields of network monitoring and security since more and more malicious code in the wild internet c...