— By monitoring the exchanged IPsec traffic an adversary can usually easily discover the layout of virtual private networks (VPNs). Of even worse extend is the disclosure if com...
Michael Brinkmeier, Michael Rossberg, Guenter Scha...
This paper proposes a MANET/VANET based group communication system, P2Pnet, to support the communication and information demand for mobile group users such as rescue teams in cata...
— This paper aims at proposing a dynamic resource reservation scheme to enhance wireless multicasting protocols run in the hierarchical mobile IP version 6 (HMIPv6) based network...
Huei-Wen Ferng, Wen-Yan Kao, Jeng-Ji Huang, David ...
— A mobile ad hoc network (MANET) is vulnerable to malicious attacks although it is suitable for various environments because of its rapid establishment. In order to set up a sec...
Abstract. In this paper, the evaluation of random bit generators for security applications is discussed and the concept of stateless generator is introduced. It is shown how, for t...