The holy grail of a mathematical model of secure encryption is to devise a model that is both faithful in its description of the real world, and yet admits a construction for an en...
Given the increasing dependence of our societies on networked information systems, the overall security of these systems should be measured and improved. Existing security metrics...
Abstract--Personal communication service (PCS) networks offer mobile users multimedia applications with different quality-ofservice (QoS) and bandwidth requirements. This paper pro...
The availability of inexpensive and powerful graphics cards as well as fast Internet connections make Networked Virtual Environments viable for millions of users and many new appl...
Now that smart phones can interact with computers through various interface technologies such as Bluetooth, infrared, or the 802.11 family of IEEE specifications, they are workin...