Abstract--We consider resource-constrained broadcast authentication for n receivers in a static, known network topology. There are only two known broadcast authentication protocols...
Recent advancement in peer-to-peer (P2P) technologies has enabled a wide range of new applications. In this paper, we present mixed integer programming (MIP) formulations to analy...
Internet telephony must offer the standard telephony services. However, the transition to Internetbased telephony services also provides an opportunity to create new services more...
This paper presents the mStar environment, which creates an environment for truly scalable distributed teamwork. It can be and is being used on a daily basis for electronic meetin...
— Incremental deployment of a new network service or protocol is typically a hard problem, especially when it has to be deployed in the routers. First, an incrementally deployabl...