What would a PKI look like if it were designed for implementability and deployability rather than strict adherence to a particular theoretical or mathematical model? This paper pr...
With the development of location aware sensor applications, location determination has become an increasingly important middleware technology. Numerous current technologies for lo...
Nipoon Malhotra, Mark D. Krasniewski, Chin-Lung Ya...
Mobile code systems provide an infrastructure that supports autonomous mobile components, called mobile agents. The infrastructure implements services for the transfer, execution,...
— Traceback mechanisms are a critical part of the defense against IP spoofing and DoS attacks, as well as being of forensic value to law enforcement. Currently proposed IP trace...
Existing approaches for sensor networks suffer from a number of critical drawbacks. First, homogeneous deployments have been commonly assumed, but in practice multiple deployments ...
Lionel M. Ni, Yanmin Zhu, Jian Ma, Minglu Li, Qion...