Abstract--Sensor network ubiquitous environments may generate a lot of data including heterogeneous `raw' sensor data, low-level feature and/or trend data and higher-level con...
Brian J. d'Auriol, Le Xuan Hung, Sungyoung Lee, Yo...
IPv6 embraces various good features from the security perspective, but the improvements also bring us some new challenges for web content filtering. This paper presents a new fram...
A connection-chain refers to a mechanism in which someone recursively logs into a host, then from there logs into another host, and so on. Connection-chains represent an important...
This paper focuses on designing incentive mechanisms for overlay multicast systems. Existing proposals on the problem are no longer able to provide proper incentives when rational...
Linear cryptanalysis, along with differential cryptanalysis, is an important tool to evaluate the security of block ciphers. This work introduces a novel extension of linear crypt...