—Anonymity is one of the main motivations for conducting denial-of-service attacks. Currently, there is no mechanism to either identify the true source of an IP packet or to prov...
Marcelo D. D. Moreira, Rafael P. Laufer, Natalia C...
This paper proposes and evaluates strategies to build reliable and secure wireless ad hoc networks. Our contribution is based on the notion of inner-circle consistency, where loca...
Claudio Basile, Zbigniew Kalbarczyk, Ravishankar K...
As the Internet evolves into a universal network for all communication needs, it has to stand up to the high quality standards of traditional networks, such as the telephone netwo...
Athina Markopoulou, Fouad A. Tobagi, Mansour J. Ka...
This work presents a user position management system for Wi-Fi networks. The location system is based on access point coverage range and beacon devices. The implementation was mad...
Andrei Oliveira da Silva, Paulo Henrique de Souza ...
Communication environments are becoming increasingly more complex due to the diversity of available network technologies in terms of spatial coverage and design characteristics, a...