Confidentiality and availability issues in mobile unattended wireless sensor networks

In Mobile Unattended Wireless Sensor Networks (MUWSNs), nodes sense the environment and store the acquired data until the arrival of a trusted data sink. MUWSNs, other than being a reference model for an increasing number of military and civilian applications, also capture a few important characteristics of emerging computing paradigms like Participatory Sensing (PS). In this paper, we start by identifying the main features and issues of MUWSNs, revising the related work in the area and highlighting their shortcomings.

SLAP: Secure Lightweight Authentication Protocol for Resource-constrained Devices.

Motivated by the upcoming Internet of Things, designing light-weight authentication protocols for resource constrained devices is among the main research directions of the last decade. Current solutions in the literature attempt either to improve the computational efficiency of cryptographic authentication schemes, or to build a provably-secure scheme relying on the hardness of a specific mathematical problem.

Comparison of Different Reweighting Approaches for the Calculation of Conformational Variability of Macromolecules from Molecular Simulations

Conformational variability and heterogeneity are crucial determinants of the function of biological macromolecules. The possibility of accessing this information experimentally suffers from severe under-determination of the problem, since there are a few experimental observables to be accounted for by a (potentially) infinite number of available conformational states. Several computational methods have been proposed over the years in order to circumvent this theoretically insurmountable obstacle.