This paper introduces concast, a new network service. Concast is the inverse of multicast: multiple sources send messages toward the same destination, which results in a single me...
Kenneth L. Calvert, Jim Griffioen, Amit Sehgal, Su...
This paper argues that there are two types of mobile phone user. The study focused on the interactional experience of mobile phone calls and text messages. The research involved 3...
In this paper, we demonstrate the application of Trusted Computing to securing Peer-to-Peer (P2P) networks. We identify a central challenge in providing many of the security servi...
This paper describes a security architecture designed to support role-based access control for distributed object systems in a large-scale, multi-organisational enterprise in whic...
One of the current challenge of the Mobile IPv6 Working Group at the IETF is to dynamically assign to a Mobile Node its Home Agent, Home Address and to setup necessary security ass...
Julien Bournelle, Jean Michel Combes, Maryline Lau...