Wireless Sensor Networks (WSNs) are usually deployed in the non-controlled environment without maintenance, facing the danger of information disclosure, tampering, replay attacks, denial of service and other threats, it makes collaboration among WSN nodes become more and more vital. Some common trust collaboration model is analyzed and summarized in this ...Download Now
Authenticating remote users in Wireless Sensor Networks (WSN) is an important security issue due to their unattended and hostile deployments. Usually, sensor nodes are equipped with limited computing power, storage, and communication module, thus authenticating remote users in such resource constrained environment is a critical security concern. Recently, Yeh et ...Download Now
Certificateless public key cryptography simplifies the complex certificate management in the traditional public key cryptography and resolves the key escrow problem in identity-based cryptography. Many certificateless designated verifier signature protocols using bilinear pairings have been proposed. But the relative computation cost of the pairing is approximately twenty times higher than ...Download Now
Submit Your Content
Get your content listed in our directory for free!
Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?