Capítols de llibre
Recent Submissions
-
MHT-based mechanism for certificate revocation in VANETs
(Springer, 2014-07)
Part of book or chapter of book
Restricted access - publisher's policyVehicular Ad Hoc Networks (VANETs) require mechanisms to authenticate messages, identify valid vehicles, and remove misbehaving vehicles. A Public Key Infrastructure (PKI) can be utilized to provide these functionalities ... -
Genetic algorithms for designing network security protocols
(World Scientífic, 2010)
Part of book or chapter of book
Restricted access - publisher's policyThe design of cryptographic and security protocols for new scenarios and applications can be computationally expensive. Examples of these can be sensor or mobile ad-hoc networks where thousands of nodes can be involved. ...