—Wireless mesh networks (WMNs) promise to extend high-speed wireless connectivity beyond what is possible with the current WiFi-based infrastructure. However, their unique archit...
Physical-layer identification of wireless devices, commonly referred to as Radio Frequency (RF) fingerprinting, is the process of identifying a device based on transmission imperf...
Boris Danev, Heinrich Luecken, Srdjan Capkun, Kari...
—In this paper we study the propagation of malicious software in wireless ad hoc networks under a probabilistic framework. We design topology control algorithms for the developme...
Vasileios Karyotis, Symeon Papavassiliou, Mary Gra...
Recently, Yeh et al. proposed an improved password authenticated key exchange scheme (YSYCT scheme) which is secure against undetectable on-line password guessing attacks and prov...