In this paper, we present STP, a system in which communicating end hosts use untrusted mobile code to remotely upgrade each other with the transport protocols that they use to com...
Parveen Patel, Andrew Whitaker, David Wetherall, J...
Using hypervisors or virtual machine monitors for security has become very popular in recent years, and a number of proposals have been made for supporting multi-level security on...
If we expect the computer to vanish in the background, to make pervasive computing a reality, first we must be able to provide the illusion that all the user’s computers, devic...
Francisco J. Ballesteros, Gorka Guardiola, Enrique...
We introduce and describe a novel network simulation tool called NeSSi (Network Security Simulator). NeSSi incorporates a variety of features relevant to network security distingu...
While traditional fixed-wired network protocols like 2Phase-Commit guarantee atomicity, we cannot use them in mobile low bandwidth networks where network partitioning, node failu...