This paper addresses the following question: Is it possible to migrate TCP/IP flows between different networks on modern mobile devices, without infrastructure support or protocol...
Ahmad Rahmati, Clayton Shepard, Chad Tossell, Ange...
Recent operating systems [12, 21, 26] have shown that decentralized information flow control (DIFC) can secure applications built from mostly untrusted code. This paper extends DI...
Nickolai Zeldovich, Silas Boyd-Wickizer, David Maz...
Constant increase in use of wireless infrastructure networks for business purposes created a need for strong safety mechanisms. This paper describes WEP (Wired Equivalent Privacy) ...
Abstract. All equipments attached to the Internet are configured with one or several IP addresses. Most hosts are able to automatically request (e.g., from a DHCP server) or discov...
Abstract— Application Level Gateways and firewalls are commonly used to enforce security policies at network boundaries, especially in large-sized business networks. However, se...
Manuel Crotti, Maurizio Dusi, Francesco Gringoli, ...