Abstract—We present the design and experimental evaluation of Simultaneous TRansmission with Orthogonally Blinded Eavesdroppers (STROBE). STROBE is a cross-layer approach that ex...
Peer-to-Peer (P2P) applications and services are very common in today’s computing. The popularity of the P2P paradigm prompts the need for specialized security services which ma...
—In the current research, we present an operation framework and protection mechanism to facilitate secure environment to protect mobile agents against tampering. The system depen...
A network covert channel is a mechanism that can be used to leak information across a network in violation of a security policy and in a manner that can be difficult to detect. In...
General purpose object-oriented programs typically aren’t embarrassingly parallel. For these applications, finding enough concurrency remains a challenge in program design. To ...