We examine a knowledge representation architecture to support context interchange mediation. For autonomous receivers and sources sharing a common subject domain, the mediator’s...
Cerium is a trusted computing architecture that protects a program’s execution from being tampered while the program is running. Cerium uses a physically tamperresistant CPU and...
A system that protects the unlinkability of certain data items (e. g. identifiers of communication partners, messages, pseudonyms, transactions, votes) does not leak information t...
Abstract—Security is an important aspect for the future wireless networks. Since the number of network nodes increases constantly, and, in addition, the networks are decentralize...
Internet connectivity is defined by a set of routing protocols which let the routers that comprise the Internet backbone choose the best route for a packet to reach its destinati...
Soon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu, Xia...