This paper presents the concept and preliminary performance evaluation of a stochastic network discovery approach named opportunistic scanning. Therein, a station only pauses its ...
Most of the existing sensor network deployments are convergecast data collection applications that transmit data from multiple sources to a sink. In this paper, we present CoReDac...
Layer 2 traceback is an important component of end-toend packet traceback. Whilst IP traceback identifies the origin network, L2 traceback extends the process to provide a more ...
Ensuring dependability and security of Peer-toPeer (P2P) systems is an intricate task due to the autonomous and volatile nature of peers and the decentralization that characterize...
Theofrastos Koulouris, George Spanoudakis, Theocha...
CardSpace (formerly known as InfoCard) is a Digital Identity Management system that has recently been adopted by Microsoft. In this paper we identify two security flaws in CardSp...