Many modern computing environments involve dynamic peer groups. Distributed simulation, multi-user games, conferencing and replicated servers are just a few examples. Given the op...
We derive bounds on the expected loss for authentication protocols in channels which are constrained due to noisy
conditions and communication costs. This is motivated by a
numbe...
Abstract. At present, network users have to manage a set of authentication credentials (usually a username/password pair) for every service with which they are registered. Single S...
The growth of wireless LANs has brought the expectation for high-bitrate streaming video to wireless PCs. However, it remains unknown how to best adapt video to wireless channel ch...
Feng Li, Jae Chung, Mingzhe Li, Huahui Wu, Mark Cl...