Abstract-- Computing constrained shortest paths is fundamental to some important network functions such as QoS routing, which is to find the cheapest path that satisfies certain co...
Efficient key distribution is an important problem for secure group communications. The communication and storage complexity of multicast key distribution problem has been studied ...
Abstract--Embedded systems present significant security challenges due to their limited resources and power constraints. This paper focuses on the issues of building secure embedde...
Guy Gogniat, Tilman Wolf, Wayne P. Burleson, Jean-...
Conventional hybrid automatic retransmission request (HARQ) is usually used to maximize throughput. However, high throughput is achieved at the expense of high latency. We study a...
Abstract--Wireless infrastructures can be conveniently categorized into two types: those that provide point-to-point `unicast' connectivity (e.g., cellular) and others that ar...