This paper explores the firewall security and performance relationship for distributed systems. Experiments are conducted to set firewall security into seven different levels and ...
Abstract. Currently knownbasic anonymitytechniques dependon identity verication. If verication of user identities is not possible due to the related management overhead or a gene...
Model checking is a powerful and widespread technique for the verification of finite distributed systems. However, the main hindrance for wider application of this technique is the...
We examine the interference of fairness and observers in digital coin systems. Since copying of coins cannot be prevented cryptographically in anonymous off-line coin systems, dou...
This paper describes the architecture and implementation of a mobile IP system. It allows mobile hosts to roam between cells implemented with 2-Mbps radio base stations, while mai...
Trevor Blackwell, Kee Chan, Koling Chang, Thomas C...