This paper focuses on sensor networks as shared environmental infrastructures, and presents an approach to enable a sensor network to self-partition itself, at pre-defined energy ...
This paper introduces an asynchronous optimistic certified email protocol, with stateless recipients, that relies on key chains to considerably reduce the storage requirements of t...
Jan Cederquist, Muhammad Torabi Dashti, Sjouke Mau...
With an increasing number of vehicles equipped with embedded computing platforms and advanced wireless technology, general purpose vehicle telematics applications are highly promi...
Traditional security analyses are often geared towards cryptographic primitives or protocols. Although such analyses are absolutely necessary, they do not provide much insight for...
Epidemic protocols such as gossip have proven to have many desirable properties for information sharing. However, trust is one of the issues that is yet to be examined with respec...