Abstract. We introduce a novel remotely-mounted attack that can expose the network identity of an anonymous client, hidden service, and anonymizing proxies. To achieve this, we emp...
Abstract-- The performance of ad hoc networks depends on cooperation and trust among distributed nodes. To enhance security in ad hoc networks, it is important to evaluate trustwor...
Abstract— Recent outbreaks of virus and worm attacks targeted at cell phones have have bought to the forefront the seriousness of the security threat to this increasingly popular...
Abstract. Wireless Ad-hoc networks are distributed systems that often reside in error-prone environments. Self-stabilization lets the system recover autonomously from an arbitrary ...
Abstract—The IP Multimedia Subsystem (IMS) is being deployed in the Third Generation (3G) networks since it supports many kinds of multimedia services. However, the security of I...
Bo Zhao, Caixia Chi, Wei Gao, Sencun Zhu, Guohong ...