—Jamming resistance is crucial for applications where reliable wireless communication is required. Spread spectrum techniques such as Frequency Hopping Spread Spectrum (FHSS) and...
Widespread use of surveillance cameras in offices and
other business establishments, pose a significant threat to
the privacy of the employees and visitors. The challenge of
int...
Maneesh Upmanyu, Anoop M. Namboodiri, Kannan Srina...
In this paper, we present a watermarking based approach, and its implementation, for mitigating phishing attacks - a form of web based identity theft. ViWiD is an integrity check m...
Mercan Topkara, Ashish Kamra, Mikhail J. Atallah, ...
Abstract. Span programs provide a linear algebraic model of computation. Monotone span programs (MSP) correspond to linear secret sharing schemes. This paper studies the properties...
While it has been argued that application-layer overlay protocols can enhance services in mobile ad-hoc networks, hardly any empirical data is available on the throughput and dela...