Abstract: We developed a free form deformation application for an immersive environment in which users can interact freely using data gloves. To ensure better comfort and performan...
Manuel Veit, Antonio Capobianco, Dominique Bechman...
We study rationality in protocol design for the full-information model, a model characterized by computationally unbounded adversaries, no private communication, and no simultanei...
Abstract— A TCP-friendly Additive Increase and Multiplicative Decrease (AIMD) protocol is proposed to support timesensitive applications in hybrid wired/wireless networks. By ana...
We study the security of the widely deployed Secure Session Layer/Transport Layer Security (TLS) key agreement protocol. Our analysis identifies, justifies, and exploits the modul...
Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures fro...
Jung Il Choi, Maria A. Kazandjieva, Mayank Jain, P...