Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally, fuzz testing tools apply random mutations to well-formed inputs of a progr...
Patrice Godefroid, Michael Y. Levin, David A. Moln...
C applications, in particular those using operating system level services, frequently comprise multiple crosscutting concerns: network protocols and security are typical examples ...
We present a simple, efficient, and secure multicast protocol with copyright protection in an open and insecure network environment. There is a wide variety of multimedia applicat...
: Current multicast routing protocols have not been designed for mobile nodes and especially roaming sources. Using the remote subscription as basis, we develop a new approach base...
This paper addresses initial ranging (uplink synchronization and power control) for TDD OFDMA systems. Exploiting the channel knowledge from the downlink channel together with ini...