This paper proposes a network-assisted mobile Virtual Private Network (mVPN) security scheme that provides secure remote access to corporate resources over the Universal Mobile Te...
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Abstract— Understanding link statistics in mobile ad hoc networks (MANETs) is essential to design adaptive routing protocols and achieve desired network performance. While much a...
Individuals face additional challenges when interacting in virtual teams. The lack of media richness and the asynchronous nature of technologically transmitted messages make commu...
Recently, various robots capable of having a video chat with distant people have become commercially available. This paper shows that movement of these robots enhances distant peo...