Abstract--This paper presents a recursive computational multisecret sharing technique that hides k - 2 secrets of size b each into n shares of a single secret S of size b, such tha...
—In this paper, we show through a simple secure symmetric key based protocol design and experiments the feasibility of secure data collection in a vehicular sensor networks. This...
Harry Gao, Seth Utecht, Gregory Patrick, George Hs...
In this paper we study the use of vehicles as sensors in a "vehicular sensor network," a new network paradigm that is critical for gathering valuable information in urba...
Uichin Lee, Eugenio Magistretti, Biao Zhou, Mario ...
This paper presents a strong security scheme for network-attached storage (NAS) that is based on capability and uses a key distribution scheme to keep network-attached storage fro...
—We address pairwise and (for the first time) triple key establishment problems in wireless sensor networks (WSN). We use combinatorial designs to establish pairwise keys betwee...