Electronic commerce technology offers the opportunity to integrate and optimize the global production and distribution on supply chain. Computers of various corporations, located t...
We present the architecture, user interface and prototype implementation of Fluid Voice, a proximity based mobile group communication system for opportunistic social exchanges. It...
Speech privacy techniques are used to scramble clear speech into an unintelligible signal in order to avoid eavesdropping. Some analog speech-privacy equipments (scramblers) have ...
Jose Francisco de Andrade, Marcello Luiz Rodrigues...
Covert channel attacks utilize shared resources to indirectly transmit sensitive information to unauthorized parties. Current security mechanisms such as SELinux rely on tagging th...
Yung-Chuan Lee, Stephen Bishop, Hamed Okhravi, Sha...
Abstract. This paper investigates the challenges involve in designing a dynamic channel assignment (DCA) scheme for wireless mesh networks, particularly for multi-radio systems. It...
Tope R. Kareem, Karel Matthee, H. Anthony Chan, Nt...