— Organizations use security policies to regulate how they share and exchange information, e.g., under what conditions data can be exchanged, what protocols are to be used, who i...
Having stealth and lightweight authentication methods is empowering network administrators to shelter critical services from adversaries. Spread-Spectrum TCP (SSTCP) [1] is one of...
—Regarding to address allocation, a mobile ad hoc network (MANET) may suffer from the lack of address and network partition/merging due to mobility of nodes. In this paper, we pr...
More and more personal data is exposed to automatic and programmatic access, making it more difficult to safeguard the personal information from unauthorised access at every step. ...
MPEG-7 is an excellent choice for the description of audiovisual content due to its flexibility and comprehensiveness. The drawback is that these properties also increase the comp...