Abstract--This paper presents a recursive computational multisecret sharing technique that hides k - 2 secrets of size b each into n shares of a single secret S of size b, such tha...
The purpose of this work is to automate the analysis of ad hoc routing protocols in the presence of attackers. To this end, a formal model of protocol behavior is developed in whi...
Although mobile devices are globally omnipresent, security developments for these devices have not kept pace with their technological advancements. Thus, mobile devices are increa...
Grant A. Jacoby, Thadeus Hickman, Stuart Warders, ...
FlashDB is a self-tuning database optimized for sensor networks using NAND flash storage. In practical systems flash is used in different packages such as on-board flash chips,...
Abstract-- This work deals with devising a secure, powerefficient, beam-steerable and on-chip transmission system for wireless sensor networks. A passively controllable smart (PCS)...
Javad Lavaei, Aydin Babakhani, Ali Hajimiri, John ...