The implementation of network security devices such as firewalls and IDSs are constantly being improved to accommodate higher security and performance standards. Using reliable a...
Adel El-Atawy, Taghrid Samak, Zein Wali, Ehab Al-S...
This paper presents an approach for managing access to services over presence-based communications based on the context of the situation. This paper addresses two technical challe...
The last fifteen years has seen a vast proliferation of middleboxes to solve all manner of persistent limitations in the Internet protocol suite. Examples include firewalls, NATs,...
Colin Dixon, Arvind Krishnamurthy, Thomas E. Ander...
This paper deals with the problem of secure data transmission based on multi-input multi-output delayed chaotic systems. A new multi-input secure data transmission scheme is propo...
Gang Zheng, Driss Boutat, Thierry Floquet, Jean-Pi...