To facilitate a broad range of experimental research on novel protocols and application concepts, we employ an indoor wireless testbed to emulate the performance of the real-world...
Jing Lei, Roy D. Yates, Larry J. Greenstein, Hang ...
The problem of secure routing in mobile ad hoc networks is long-standing and has been extensively studied by researchers. Recently, techniques of aggregating signatures have been a...
The concept of hierarchical access control is that a higher privileged user (or higher level) has the ability to access data in lower privileged user (or lower level). Hierarchica...
: Gaining access to high-quality health data is a vital requirement to informed decision making for medical practitioners and pharmaceutical researchers. Driven by mutual benefits ...
Noman Mohammed, Benjamin C. M. Fung, Patrick C. K....
Abstract. Anonymizing networks such as Tor allow users to access Internet services privately using a series of routers to hide the client’s IP address from the server. Tor’s su...
Peter C. Johnson, Apu Kapadia, Patrick P. Tsang, S...