Identity-Based Secure Distributed Data Storage

Identity-Based Secure Distributed Data Storage Schemes ABSTRACT: Secure distributed data storage can shift the burden of maintaining a large number of files from the owner to proxy servers. Proxy servers can convert encrypted files for the owner to encrypted files for the receiver without the necessity of knowing the content of the original files. In […]


EAACK—A Secure Intrusion-Detection System for MANETs

EAACK—A Secure Intrusion-Detection System for MANETs ABSTRACT: The migration to wireless network from wired network has been a global trend in the past few decades. The mobility and scalability brought by wireless network made it possible in many applications. Among all the contemporary wireless networks, Mobile Ad hoc NETwork (MANET) is one of the most […]