—With a widespread increase in the number of mobile wireless systems and applications, the need for location aware services has risen at a very high pace in the last few years. M...
Tracing resource usage by Grid users is of utmost importance — especially in the context of large-scale scientific collaborations such as within the High Energy Physics (HEP) c...
Rosario M. Piro, Michele Pace, Antonia Ghiselli, A...
Identity theft through phishing attacks has become a major concern for Internet users. Typically, phishing attacks aim at luring the user to a faked web site to disclose personal ...
Sebastian Gajek, Ahmad-Reza Sadeghi, Christian St&...
Existing access control systems are typically unilateral in that the enterprise service provider assigns the access rights and makes the access control decisions, and there is no n...
Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, ...
Abstract— This paper focuses on the unfairness problem between TCP uplink and downlink flows in the 802.11 Wi-Fi hot spots and shows that the service is prone to be unfair. The ...