Secure networks rely upon players to maintain security and reliability. However not every player can be assumed to have total loyalty and one must use methods to uncover traitors ...
Group communication in multicast environment has been a growing importance in ad hoc networks, and providing secure communication in the group is essential in many ad hoc applicat...
Hartono Kurnio, Huaxiong Wang, Josef Pieprzyk, Kri...
Both Java RMI and Jini use a proxy-based architecture. In this architecture, a client interacts with a service through a proxy, which is code downloaded from a directory and insta...
Abstract—Free-space optical (FSO) links are competitive wireless links offering high data rate, security and low system complexity. For mobile applications, e.g., from a ground b...
Theoretical models of ultrawideband (UWB) radio channels indicate that pairs of UWB radio transceivers measure their common radio channel with a high degree of agreement and third ...
Masoud Ghoreishi Madiseh, Shuai He, Michael L. McG...