This paper introduces a novel feedback arrangement, termed re-feedback. It ensures metrics in data headers such as time to live and congestion notification will arrive at each re...
Bob Briscoe, Arnaud Jacquet, Carla Di Cairano-Gilf...
Embedded devices implementing cryptographic services are the result of a trade-off between cost, performance and security. Aside from flaws in the protocols and the algorithms us...
Protection of digital multimedia content has become an increasingly important issue for content owners and service providers. As watermarking is identified as a major technology t...
In our present work we introduce the use of data fusion in the field of DoS anomaly detection. We present DempsterShafer’s Theory of Evidence (D-S) as the mathematical foundati...
Abstract. SSL is one of the most popular protocols used on the Internet for secure communications. However SSL protocol has several problems. First, SSL protocol brings considerabl...
Eun-Ae Cho, Young-Gab Kim, Chang-Joo Moon, Doo-Kwo...