Are you an EPFL student looking for a semester project?
Work with us on data science and visualisation projects, and deploy your project as an app on top of GraphSearch.
Loading
Loading
Loading
Loading
Loading
No results
Loading
Loading
Loading
Naouel Ben Salem, Levente Buttyan, Jean-Pierre Hubaux
MAC layering" to reduce the space overhead in the packets and a stream cipher encryption mechanism to provide
implicit authentication" of the nodes involved in the communication. We analyze the robustness of our protocols against rational and malicious attacks. We show that - using our solution - collaboration is rational for selfish nodes. We also show that our protocols thwart rational attacks and detect malicious attacks.Naouel Ben Salem, Jean-Pierre Hubaux