The design and implementation of a national computing system and data grid has become a reachable goal from both the computer science and computational science point of view. A di...
Abstract—Public communication during natural and manmade disasters is a key issue that must be addressed to protect lives and properties. The choice of the best protective action...
Abstract The Host Identity Protocol (HIP) is an Internet security and multiaddressing mechanism specified by the IETF. HIP introduces a new layer between the transport and network ...
Abstract—Camera networks are used for a variety of applications including surveillance, traffic monitoring or elderly care. The shift from analog towards fully digitized systems...
Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...