— In this paper a new protocol for IP mobility management is described, which follows a network-based approach and fulfils the requirements of optimized usage of radio spectrum a...
Ivano Guardini, Gerardo Giaretta, Francesco Miconi
Security protocols are not as secure as we assumed. In this paper, we identified a practical way to launch DoS attacks on security protocols by triggering exceptions. Through exp...
Yao Zhao, Sagar Vemuri, Jiazhen Chen, Yan Chen, Ha...
This paper presents work in progress to explore the possibility of combining model-driven and domain modeling techniques to facilitate support for reuse and automation. The approa...
The current Internet addressing architecture does not verify the source address of a packet received and forwarded. This causes serious security and accounting problems. Based on t...
Abstract— P6P is a new, incrementally deployable networking infrastructure that resolves the growing tensions between the Internet routing infrastructure and the end sites of the...