A common breach of network security is the class of attacks called Worm-virus. This paper proposes a language called Triton whose goal is to efficiently and effectively safeguard ...
Jangha Kim, Byungwook Song, Kanghee Lee, Sangwook ...
Although Instant Messaging (IM) services are now relatively long-standing and very popular as an instant way of communication over the Internet, they have received little attention...
The Host Identity Indirection Infrastructure (Hi3) is a networking architecture for mobile hosts, derived from the Internet Indirection Infrastructure (i3) and the Host Identity P...
Andrei Gurtov, Dmitry Korzun, Andrey Lukyanenko, P...
Mobile IP and Network Mobility are the IETF proposals to obtain mobility. However, both of them have routing limitations, due to the presence of an entity (Home Agent) in the commu...
: Ubiquitous worldwide broadband Internet access as well the coming of age of VoIP technology have made Voice-over-IP an increasingly attractive and useful network application. Cur...
Andreas Steffen, Daniel Kaufmann, Andreas Stricker