We address issues related to privacy protection in location-based services (LBS). Most existing research in this field either requires a trusted third-party (anonymizer) or uses ...
Aniket Pingley, Wei Yu, Nan Zhang 0004, Xinwen Fu,...
This paper analyzes a network-baseddenial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many T...
Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, E...
—Given the potential scale on which a Wireless Sensor Network (WSN) can be deployed, multi-hop communication will be a pivotal component of the system. When redundant nodes are d...
Richard Tynan, Gregory M. P. O'Hare, Michael J. O'...
The web service is a main working pattern and a significant application model for next generation Internet application. The service-oriented architecture is a very promising archi...
Routing oscillation is highly detrimental. It can decrease performance and lead to a high level of update churn placing unnecessary workload on router the problem is distributed b...