We propose a novel solution for securing wireless ad-hoc networks. Our goal is to provide secure key exchange in the presence of device failures and denial-of-service attacks. The ...
Arno Wacker, Timo Heiber, Holger Cermann, Pedro Jo...
This paper presents a three steps methodology for predicting the failure shear effort in concrete beams. In the first step, dimensional analysis is applied to obtain several sets o...
Amparo Alonso-Betanzos, Enrique Castillo, Oscar Fo...
Current anonymous systems either use a small, fixed core set of mixes or randomly choose a sequence of peer nodes to form anonymous paths/tunnels. The resulting paths are fragile ...
An all too real threat to the privacy offered by a mix network is that individual mix administrators may volunteer partial tracing information to a coercer. While this threat can ...
XiaoFeng Wang, Philippe Golle, Markus Jakobsson, A...
– Prognostic health management (PHM) of electronic systems presents challenges traditionally viewed as either insurmountable or otherwise not worth the cost of pursuit. Recent ch...
Douglas W. Brown, Patrick W. Kalgren, Carl S. Byin...