Some "non-' or "extra-functional" features, such as reliability, security, and tracing, defy modularization mechanisms in programming languages. This makes suc...
Eric Wohlstadter, Stoney Jackson, Premkumar T. Dev...
More and more services are available on public terminals. Due to their public location and permanent availability, they can easily fall victim to manipulation. These manipulations...
Alexander De Luca, Bernhard Frauendienst, Sebastia...
We address the problem of control-channel jamming attacks in multi-channel ad hoc networks. Deviating from the traditional view that sees jamming attacks as a physical-layer vulne...
Privacy and security are critical requirements for using patient profiles in distributed healthcare environments. The amalgamation of new information technology with traditional ...
Mohammad H. Yarmand, Kamran Sartipi, Douglas G. Do...
The problem of security against timing based traffic analysis in multihop networks is considered in this work. In particular, the relationship between the level of anonymity prov...