Category: .Net

Message Authentication in Computationally Constrained Environments

Message Authentication in Computationally Constrained Environments  Abstract RFID and wireless sensor networks exemplify computationally constrained environments, where the compact nature of the components cannot support complex computations or high communication overhead. On the other hand, such components should support security applications such as message integrity, authentication, and time stamping. The latter are efficiently implemented by […]


Discovery of Ranking Fraud for Mobile Apps

Discovery of Ranking Fraud for Mobile Apps  ABSTRACT Ranking fraud in the mobile App market refers to fraudulent or deceptive activities which have a purpose of bumping up the Apps in the popularity list. Indeed, it becomes more and more frequent for App developers to use shady means, such as inflating their Apps’ sales or posting […]