|A Distributed Public Key Caching Scheme in Large Wireless Networks.
||When asymmetric cryptography techniques are used in wireless networks, the public
keys of the nodes need to be widely available and signed by a Certificate Authority (CA).
However, the existence of a single CA in large wireless networks such as mob...
|Multiple Bridge Secret Delivery in Wireless Sensor Networks
||Achieving security in wireless sensor networks is a challenging problem due to the inherent resource and computing constraints. Several key distribution techniques have been proposed in the technical literature for efficient distribution of keys to t...
|Ant-based evidence distribution with periodic broadcast in attacked wireless network
||In order to establish trust among nodes in large wireless networks, the trust certicates need to be distributed and be readily accessible. However, even so, searching for trust certicates will still become highly cost and delay especially when wirele...
|Optimizing frequency domain contention in wireless network
||Wireless communication became popular in the last decades, giving the mobility to the users. However with increased number of users and contention, network efficiency can hardly keep up with user needs. This thesis focuses on a new frequency domain c...
|A method of determining culture related users using computation of correlation
||The provision of security on most of computer networks is based on the obtaining and exchange of a unique key between the communicating parties. It is, however, difficult to come up with a truly unique and random secret between two parties with the h...
|Efficient link cuts in online social networks
||Due to the huge popularity of online social networks, many researchers focus on adding links, e.g., link prediction to help friend recommendation. So far, no research has been performed on link cuts. However, the spread of malware and misinformation ...