We consider a Gaussian two-hop network where the source and the destination can communicate only via a relay node who is both an eavesdropper and a Byzantine adversary. Both the s...
—This paper experimentally analyzes the handover performance of VoIP sessions in a wireless overlay of 802.11 WLANs and GPRS/UMTS networks when mobility is handled at the applica...
Marc Cardenete-Suriol, Josep Mangues-Bafalluy, Mar...
A general approach to achieve anonymity on P2P networks is to construct an indirect path between client and server for each data transfer. The indirection, together with randomnes...
— A research topic that is becoming increasingly popular is that of on-board mobile communication, where users on a vehicle are connected to a local network that attaches to the ...
This paper proposes a set of novel multicast algorithms for m-D mesh overlay networks that can achieve shorter multicast delay and less resource consumptions. In contrast to previo...