The large amount of information that is spread over the Internet is an important resource for all people but also introduces some issues that must be faced. The dynamism and the un...
Sonia Bergamaschi, Giacomo Cabri, Francesco Guerra...
Classical content sharing applications like BitTorrent are not designed to run over wireless networks. When adapting them to these constrained networks, two main problems arise. On...
The cooperation of end users can be exploited to boost the performance of high-bandwidth multicast. While intraoverlay cooperation, the mechanism for cooperation within a single o...
—Revocation of public-key certificates is an important security primitive. In this paper, we design a fully distributed local certificate revocation scheme for ephemeral networ...
Igor Bilogrevic, Mohammad Hossein Manshaei, Maxim ...
Computer systems are rapidly becoming so complex that maintaining them with human support staffs will be prohibitively expensive and inefficient. In response, visionaries have beg...