Abstract--Node mobility has a direct impact on the performance evaluation of various network mobility protocols. Unfortunately, most of the analysis on mobility protocols used Rand...
Abstract--The steadily growing importance of Internetbased applications and their resilience requirements lead to a rising number of multi-homed sites. The idea of Concurrent Multi...
Thomas Dreibholz, Martin Becke, Jobin Pulinthanath...
—Secure multiparty computation is a very important research topic in cryptography. A secure multi-party computation involves N untrusful parties. It takes input xi from the ith p...
Recently automated deduction tools have proved to be very effective for detecting attacks on cryptographic protocols. These analysis can be improved, for finding more subtle weakn...
In this letter, we are concerned with adaptive ARQ techniques combined with backoff strategies that exploit the bursty nature of wireless links for improved energy savings. Specifi...