• Asymmetric Multi-way Ranging for Resource-Limited Nodes

  • Performance Study of the IEEE 802.15.6 Slotted Aloha Mechanism with Power Control in a Multiuser Environment

  • Communication Links Vulnerability Model for Cyber Security Mitigation

  • A Prototype Implementation of Continuous Authentication for Tactical Applications

  • Secure Data Sharing for Vehicular Ad-hoc Networks Using Cloud Computing