Abstract. The TLS and SSL protocols are widely used to ensure secure communication over an untrusted network. Therein, a client and server first engage in the so-called handshake ...
Endosymbiotic Computing entails attaching an RF-enabled microcontroller module (endomodule) to an appliance such that it appears as a networked device in the cyber world. It enabl...
Abstract. We show that accelerometers embedded in a television remote control can be used to distinguish household members based on the unique way each person wields the remote. Th...
—The two-way relay channel (TWRC) describes the communication between two terminals sharing a common relay. In this work we compare different protocols for the TWRC with a half-d...
Abstract—Real-time systems on non-preemptive platforms require a means of bounding the execution time of programs for admission purposes. Worst-Case Execution Time (WCET) is most...