Content networking is an emerging technology, where the requests for content are steered by content routers that examine not only the destinations but also content descriptors suc...
Arindam Mitra, Muthucumaru Maheswaran, Jose A. Rue...
We propose a system for the detection of unauthorized cloning of mobile agents by malicious hosts. The system can detect clones after the fact, identify the culprit, and then seek...
In 1996, Mambo et al. first introduced the concept of a proxy signature scheme, and discussed the delegation of the signing capability to a proxy signer. In 2001, Lee et al. cons...
Distributed Denial-of-Service attacks are still a big threat to the Internet. Several proposals for coping with the attacks have been made in the recent past, but neither of them ...
Simulations using a computer model the Evolution Of Culture (EVOC) indicate that the clustering of creative agents decreases the mean fitness of ideas in the short term (when imit...