Progress in networking research depends crucially on applying novel analysis tools to real-world traces of network activity. This often conflicts with privacy and security requir...
Abstract— In this paper, we present a novel and comprehensive resource management solution for the autonomous hot-spot convergence system (AHSCS) that uses sensor web. This solut...
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
As Facebook has become global, users from different cultural and socio-political contexts have joined the site. We present a case study investigating how both current and historic...
We propose a notarized federated identity management model that supports efficient user authentication when providers are unknown to each other. Our model introduces a notary servi...
Michael T. Goodrich, Roberto Tamassia, Danfeng Yao