We present an empirical study of the resistance of several protocols to denial of service (DoS) attacks on client-server communication. We show that protocols that use authenticat...
Gal Badishi, Amir Herzberg, Idit Keidar, Oleg Roma...
—Many sensor network protocols in the literature implicitly assume that sensor nodes are deployed uniformly inside a simple geometric region. When the real deployment deviates fr...
— In this paper we study two-hop cooperative diversity relaying in random wireless networks. In contrast to most work on cooperative diversity relaying where the relay node posit...
In this paper, we propose a new user authentication (UA) scheme based on one-time password (OTP) protocol for home networks. The proposed scheme is to authenticate home users ident...
This paper addresses the problem of fault resilience of overlay-based live media streaming from two aspects: (1) how to construct a stable multicast tree that minimizes the negati...