Abstract— Application Level Gateways and firewalls are commonly used to enforce security policies at network boundaries, especially in large-sized business networks. However, se...
Manuel Crotti, Maurizio Dusi, Francesco Gringoli, ...
The web's hyperlinks are notoriously brittle, and break whenever a resource migrates. One solution to this problem is a transparent resource migration mechanism, which separa...
Abstract—The growth in practical applications for iris biometrics has been accompanied by relevant developments in the underlying algorithms and techniques. Along with the resear...
Gil Melfe Mateus Santos, Hugo Pedro Martins Carric...
To protect privacy in large systems, users must be able to authenticate against a central server without disclosing their identity to the network. Private identification protocols ...
Transmit beamforming is an energy-efficient wireless communication technique that allows a transmitter with two or more antennas to focus its bandpass signal in an intended directi...