The increasing heterogeneity of communicating devices, ranging from resource constrained battery driven sensor nodes to multi-core processor computers, challenges protocol design. We examine security and privacy protocols with respect to exterior factors such as users, adversaries, and computing and communication resources; and also interior factors such as the operations, the interactions and the parameters of a protocol. Users and adversaries interact with security and privacy protocols, and even affect the outcome of the protocols. We propose user mobility and adversary models to examine how the location privacy of users is affected when they move relative to each other in specific patterns while adversaries with varying strengths try to...
A wireless sensor network is a collection of numerous sensors distributed on an area of interest to ...
Wireless sensor network (WSN) consists of many hosts called sensors. These sensors can sense a pheno...
Emergent networks like mobile ad hoc networks, sensor networks, opportunistic networks, peer-to-peer...
The increasing heterogeneity of communicating devices, ranging from resource constrained battery dri...
The increasing heterogeneity of communicating devices, ranging from resource constrained battery dri...
The increasing heterogeneity of communicating devices, ranging from resource constrained battery dri...
We present a formal model for modeling and reasoning about security protocols. Our model extends sta...
Traditional security protocols are mainly concerned with authentication and key establishment and re...
Distributed ad-hoc networks have become ubiquitous in the current technological framework. Such netw...
Despite recent dramatic advances in computer security regarding the proliferation of services and ap...
Despite recent dramatic advances in computer security regarding the proliferation of services and ap...
Intelligent security protocols can verify whether the involved principals have properties that are d...
Abstract—K-anonymity has been used to protect location privacy for location monitoring services in w...
Recent advances in sensor technologies have made sensors more economical, power efficient, and porta...
A wireless sensor network is a collection of numerous sensors distributed on an area of interest to ...
A wireless sensor network is a collection of numerous sensors distributed on an area of interest to ...
Wireless sensor network (WSN) consists of many hosts called sensors. These sensors can sense a pheno...
Emergent networks like mobile ad hoc networks, sensor networks, opportunistic networks, peer-to-peer...
The increasing heterogeneity of communicating devices, ranging from resource constrained battery dri...
The increasing heterogeneity of communicating devices, ranging from resource constrained battery dri...
The increasing heterogeneity of communicating devices, ranging from resource constrained battery dri...
We present a formal model for modeling and reasoning about security protocols. Our model extends sta...
Traditional security protocols are mainly concerned with authentication and key establishment and re...
Distributed ad-hoc networks have become ubiquitous in the current technological framework. Such netw...
Despite recent dramatic advances in computer security regarding the proliferation of services and ap...
Despite recent dramatic advances in computer security regarding the proliferation of services and ap...
Intelligent security protocols can verify whether the involved principals have properties that are d...
Abstract—K-anonymity has been used to protect location privacy for location monitoring services in w...
Recent advances in sensor technologies have made sensors more economical, power efficient, and porta...
A wireless sensor network is a collection of numerous sensors distributed on an area of interest to ...
A wireless sensor network is a collection of numerous sensors distributed on an area of interest to ...
Wireless sensor network (WSN) consists of many hosts called sensors. These sensors can sense a pheno...
Emergent networks like mobile ad hoc networks, sensor networks, opportunistic networks, peer-to-peer...