We introduce Kamouflage: a new architecture for building theft-resistant password managers. An attacker who steals a laptop or cell phone with a Kamouflage-based password manager i...
Hristo Bojinov, Elie Bursztein, Xavier Boyen, Dan ...
The Mobile IP (MIP) protocol for IP version 4 provides continuous Internet connectivity to mobile hosts. However, currently it has some drawbacks in the areas of survivability, per...
Ravi Jain, Thomas Raleigh, Danny Yang, Li-Fung Cha...
In a mobile computing system, users carrying portable devices can access database services from any location without requiring a fixed position in the networking environment. Some ...
Abstract--In this article, a video multicast protocol for multihomed mobile terminals is proposed as an alternative stream control transmission protocol (SCTP) for partially reliab...
Jinsuk Baek, Paul S. Fisher, Minho Jo, Hsiao-Hwa C...
Abstract. We have recently witnessed a growing interest in self organising systems, both in research and in practice. These systems re-organise in response to new or changing condi...
Stefanos Zachariadis, Cecilia Mascolo, Wolfgang Em...