Objective There has been a consistent concern about the inadvertent disclosure of personal information through peer-to-peer file sharing applications, such as Limewire and Morpheu...
Khaled El Emam, Emilio Neri, Elizabeth Jonker, Mar...
As Voice over IP (VoIP) applications become increasingly popular, they are more and more facing security challenges that have not been present in the traditional Public Switched Te...
In this paper, the performance of cellular networks with joint multicell processing and dedicated relay terminals is investigated. It is assumed that each relay terminal is capable...
Oren Somekh, Osvaldo Simeone, Harold Vincent Poor,...
Remote attestation is the activity of making a claim about properties of a target by supplying evidence to an appraiser over a network. We identify five central principles to guid...
George Coker, Joshua D. Guttman, Peter Loscocco, A...
Web services, with an emphasis on open standards and flexibility, may provide benefits over existing capital markets integration practices. However, web services must first meet c...