—We present a probabilistic framework for physical layer secrecy when the locations and channels of the eavesdroppers are unknown. The locations are modeled by a Poisson point pr...
— The use of covert application-layer tunnels to bypass security gateways has become quite popular in recent years. By encapsulating blocked or controlled protocols such as peert...
Maurizio Dusi, Manuel Crotti, Francesco Gringoli, ...
SIP appears to be a powerful and useful signaling protocol supporting mobility for wireless IP networks but it has inherent weaknesses and dangers. This paper is a study on the se...
— Several research groups are working on designing new security architectures for 4G networks such as Hokey and Y-Comm. Since designing an efficient security module requires a cl...
Mahdi Aiash, Glenford E. Mapp, Aboubaker Lasebae, ...
Abstract--To effectively address the explosive growth of multimedia applications over the Internet, a large-scale media streaming system has to fully take into account the issues o...