Reflector attacks are a variant of denial-of-service attacks that use unwitting, legitimate servers to flood a target. The attacker spoofs the target's address in legitimate s...
Erik Kline, Matt Beaumont-Gay, Jelena Mirkovic, Pe...
— We propose a spreading code medium access control (MAC) protocol with each node equipped with single transceiver for wireless ad hoc networks, based on the code division multip...
Abstract. The Semantic Desktop is a means to support users in Personal Information Management (PIM). It provides an excellent test bed for Semantic Web technology: resources (e. g....
The emergence of recent XML-based technologies paved the way for new types of architectures and message exchanges on the Internet through Web services. MashUps consist in combinin...
Yosri Harzallah, Vincent Michel, Qi Liu, Gabriel A...
We introduce a new cryptographic primitive called the blind coupon mechanism (BCM). In effect, the BCM is an authenticated bit commitment scheme, which is AND-homomorphic. It has n...