— In the standard approach to studying connectivity, a physical layer is assumed that allows direct transmission between neighbors within some fixed distance. The graph resultin...
In mobile peer-to-peer (MP2P) networks, nodes tend to gather together rather than scattered uniformly across the network area. This paper considers the clustering of peer nodes an...
Chansu Yu, Kang G. Shin, Ben Lee, Seung-Min Park, ...
Attacks against distributed systems frequently start at the network layer by gathering network related information (such as open TCP ports) and continue on by exhausting resources...
Michael Atighetchi, Partha Pratim Pal, Franklin We...
Abstract-- Wireless Sensor Networks (WSNs) rely on innetwork aggregation for efficiency, however, this comes at a price: A single adversary can severely influence the outcome by co...
Parisa Haghani, Panagiotis Papadimitratos, Marcin ...
The Secure Virtual Enclaves (SVE) collaboration infrastructure allows multiple organizations to share their distributed application objects, while respecting organizational autono...
Deborah Shands, Richard Yee, Jay Jacobs, E. John S...