: Today, most peer-to-peer networks are specialised for sharing files, mostly video and audio files. In this paper we describe a peer-to-peer network we are currently implementin...
Nicolas Liebau, Oliver Heckmann, Ian Hubbertz, Ral...
Very large scale networks such as the Internet require a new operational model to use resources efficiently and reduce the need for the administration necessary in clientserver n...
Despite general awareness of the importance of keeping one's system secure, and widespread availability of consumer security technologies, actual investment in security remai...
In mobile networks, authentication is a required primitive of the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudo...
Julien Freudiger, Mohammad Hossein Manshaei, Jean-...
— In contrast to the traditional wireless sensor network (WSN) applications that perform only data collection and aggregation, new generation of information processing applicatio...