— Because of limited resources at sensor nodes, sensor networks typically adopt symmetric-key algorithms to provide security functions such as protecting communications between n...
As the Web platform continues to mature, we see an increasing number of amazing technologies that take Geographic Information Systems (GIS) visualization applications to new level...
Security protocols are indispensable in secure communication. We give an operational semantics of security protocols in terms of a Prolog-like language. With this semantics, we ca...
The ever-growing use of the Internet comes with a surging escalation of communication and data access. Most existing intrusion detection systems have assumed the one-size-fits-all...
A qualitative study was conducted to explore how subjects use social networking sites and instant messenger to engage in interpersonal relationships. The results were used to deve...