Learn More
Wireless Sensor Networks (WSNs) are often deployed in hostile environments and, thus, nodes can be potentially captured by an adversary. This is a typical white-box attack context, i.e., the adversary may have total visibility of the implementation of the build-in cryptosystem and full control over its execution platform. Handling white-box attacks in a WSN(More)
Seat-level positioning of a smartphone in a vehicle can provide a fine-grained context for many interesting in-vehicle applications, including driver distraction prevention, driving behavior estimation, in-vehicle services customization, etc. However, most of the existing work on in-vehicle positioning relies on special infrastructures, such as the stereo,(More)
A dvances in telecommunication and carrier network technologies have significantly improved the ubiq-uity of wireless communication. More and more devices are becoming connected to each other and to the Internet. Applying telecommunication technologies to the vehicular scenario allows vehicles to connect to the cloud, roadside units (RSUs), and ambient(More)
Security and privacy are both fundamental requirements of vehicular networking applications. Existing anonymous authentication protocols entail serious performance issues due to serialized verification operations. This paper presents an efficient anonymous authentication protocol based on signature with message recovery. Different from existing solutions,(More)
With the urban development and enlargement, various regions such as residential zones and administrative districts now appear as parts of cities. People exhibit different mobility patterns in each region, which is closely relevant to region-wide functions. In this article, we propose a scheme to discover region-wide functions using large-scale Shanghai(More)