Most recently developed context-aware software applications make unrealistic assumptions about the quality of the available context information, which can lead to inappropriate ac...
Title of Thesis: DISTRIBUTED TRUST EVALUATION IN AD-HOC NETWORKS Georgios E. Theodorakopoulos, Master of Science, 2004 Thesis directed by: Professor John S. Baras Department of El...
Proposed by Maurer the bounded storage model has received much academic attention in the recent years. Perhaps the main reason for this attention is that the model facilitates a un...
This paper describes the activities in Application Level Active Networks (ALAN) under the DARPA-funded RADIOACTIVE Project; this is closely related to work carried out under a Eur...
Peter T. Kirstein, Piers O'Hanlon, Ken Carlberg, P...
Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. An error in a firewall policy either creates security hole...