This paper presents a comprehensive study on the performance of common MANET (mobile ad hoc network) routing protocols under realistic network scenarios. The routing protocols use...
In the last years several efforts have been devoted by researchers in the Requirements Engineering community to the development of methodologies for supporting designers during req...
Advanced optical networks deploy wavelength division multiplexing technology to transport an unprecedented amount of information per fiber. Each optical channel transports informat...
In the literature, voting protocols are considered secure if they satisfy requirements such as privacy, accuracy, robustness, etc. It can be time consuming to evaluate a voting pr...
As multicast applications are deployed for mainstream use, the need to secure multicast communications will become critical. Multicast, however, does not t the point-to-point mod...