—We propose a secure routing architecture for Mobile Ad hoc NETworks (MANETs) called ThroughpUt-Feedback (TUF) routing, which is resilient against a wide range of routing disrupt...
Ruiliang Chen, Michael Snow, Jung Min Park, M. Tam...
Data mining is frequently obstructed by privacy concerns. In many cases data is distributed, and bringing the data together in one place for analysis is not possible due to privac...
— Key management is a major challenge in the design and deployment of secure wireless sensor networks. A common assumption in most distributed key management schemes is that all ...
Elliptic curve cryptosystems are nowadays widely used in the design of many security devices. Nevertheless, since not every elliptic curve is useful for cryptographic purposes, me...
— The importance of the routers in the network and the vulnerability in the nature of the link state routing protocol highlight the necessity of effective routing protection agai...