The transmission of voice communications as datagram packets over IP networks, commonly known as Voice-overIP (VoIP) telephony, is rapidly gaining wide acceptance. With private ph...
Perfectly secret message transmission can be realized with only partially secret and weakly correlated information shared by the parties as soon as this information allows for the ...
We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t...
The rapid progress of wireless communication and embedded micro sensing technologies has made wireless sensor networks possible. Target tracking is an important application of wire...
WenCheng Yang, Zhen Fu, Jung-Hwan Kim, Myong-Soon ...
Abstract— Nodes in multi-hop wireless networks, and specifically in ad-hoc and mesh networks, are being increasingly equipped with multiple wireless network interfaces (radios) o...