- Although Internet serves many contents and services, it has serious problems of security: the invasion of privacy, hacking and etc. To prevent these problems, two implementations...
Tae Ho Kim, Jong Jin Kim, Chang Hoon Kim, Chun Pyo...
Abstract— So far, the problem of positioning in wireless networks has been mainly studied in a non-adversarial setting. In this work, we analyze the resistance of positioning tec...
To realize personalized web services and to design adaptable systems it is necessary to have a possibility for modeling the user’s environment and preferences. A common approach...
Peter Dornbusch, Michael Fahrmair, Eiman Mohyeldin...
Key management is the cornerstone for secure communication in sensor networks. Researchers have recently developed many techniques to setup pairwise keys between sensor nodes. How...
Multiparty computation protocols have been known for more than twenty years now, but due to their lack of efficiency their use is still limited in real-world applications: the goal...