Abstract. We introduce a novel remotely-mounted attack that can expose the network identity of an anonymous client, hidden service, and anonymizing proxies. To achieve this, we emp...
We study the performance of reliable and unreliable allnode broadcast over ad-hoc networks that use contentionbased channel access. To obtain analytical results while preserving h...
: In this paper, we have proposed a time efficient, energy saving and robust broadcast/multicast protocol for reconfigurable cluster-based sensor network. In our broadcast protocol...
Wei Chen, Islam A. K. M. Muzahidul, Mohan Malkani,...
—This paper deals with a simple but essential two-hop wireless relay network employing network coding and a slotted ALOHA protocol. Network coding is a recent and highly regarded...
Time-driven Key Sequencing (TKS) is a key management technique that synchronizes the session key used by a set of communicating principals based on time of day. This relatively lo...
Geoffrey G. Xie, Cynthia E. Irvine, Timothy E. Lev...