Latest News

[September 2014] Our paper entitled Multiuser MIMO Scheduling for Mobile Video Applications has been accepted in IEEE Transactions on Wireless Communications.

[September 2014] Our paper entitled High-Throughput Reliable Multicast in Multi-Hop Wireless Mesh Networks has been accepted in IEEE Transactions on Mobile Computing.

[September 2014] Our paper entitled A Remote Attestation Protocol with Trusted Platform Modules (TPMs) has been accepted in Security and Communication Networks.

[August 2014] Our paper entitled Securing First-Hop Data Provenance for Bodyworn Devices using Wireless Link Fingerprints has been accepted as a Regular Paper in an upcoming issue of the Transactions on IEEE Transactions on Information Forensics & Security.

[May 2014] Invited to the TPC of  prestigious security conferences ACM Wisec 2014 and ACM CCS 2014.

[April 2014] Our paper entitled Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks has been accepted as a Regular Paper in an upcoming issue of the Transactions on Dependable and Secure Computing.

[November 2013] Our paper entitled Provenance-Aware Security Risk Analysis for Hosts and Network Flows has been accepted to the regular Technical track of the IFIP/IEEE Network Operations and Management Symposium (NOMS 2014).

[August 2013] Our paper entitled A Robust Iterative Filtering Technique for Wireless Sensor Networks in the Presence of Malicious Attacks was accepted at ACM SenSys 2013.

[August 2013] Our paper entitled DEMO Abstract: Securing Data Provenance in Body Area Networks using Lightweight Wireless Link Fingerprints was accepted at ACM SenSys 2013.