Abstract In this paper, an agent based WLAN/cellular network integrated service model and relevant authentication scheme is proposed. The service model, or solution, does not r...
Minghui Shi, Humphrey Rutagemwa, Xuemin Shen, Jon ...
We analyze the problem of reducing packet losses due to the authentication time which is required when an ad hoc node switches across different gateways in a mobile ad hoc network...
Gordon and Jeffrey have proposed a type and effect system for checking authenticity in cryptographic protocols. The type system reduces the protocol verification problem to the typ...
Abstract. In this paper a fully automatic face verification system is presented. A face is characterized by a vector (jet) of coefficients determined applying a bank of Gabor fil...
Stefano Arca, Paola Campadelli, Elena Casiraghi, R...
—Today, middleboxes such as firewalls and network address translators have advanced beyond simple packet forwarding and address mapping. They also inspect and filter traffic, ...