Covert channel attacks utilize shared resources to indirectly transmit sensitive information to unauthorized parties. Current security mechanisms such as SELinux rely on tagging th...
Yung-Chuan Lee, Stephen Bishop, Hamed Okhravi, Sha...
IP telephony over mobile ad hoc networks is a topic of emerging interest in the research arena as one of the paths toward the fixed-mobile convergence in telecommunications networ...
Paolo Giacomazzi, Luigi Musumeci, Giuseppe Caizzon...
Peer-to-Peer (P2P) technology is regarded as being disruptive for traditional fixed and mobile operators. However, it can also be considered as an opportunity for new ways of serv...
Wolfgang Kellerer, Zoran Despotovic, Maximilian Mi...
In this paper, we propose an on-demand distributed clustering algorithm for multi-hop packet radio networks. These types of networks, also known as ad hoc networks, are dynamic in ...
Today’s wireless LANs require efficient integration of multimedia and traditional data traffic. Multimedia network applications are time-bounded and have stricter QoS demands. T...
T. D. Lagkas, Georgios I. Papadimitriou, Petros Ni...