As multimedia- and group-oriented computing becomes increasingly popular for the users of wireless mobile networks, the importance of features like quality of service (QoS) and mul...
Testing is a necessary, but costly process for user-centric quality control. Moreover, testing is not comprehensive enough to completely detect faults. Many formal methods have bee...
Abstract. Networks describe various complex natural systems including social systems. Recent studies have shown that these networks share some common properties. While studying com...
We describe relay attacks on Bluetooth authentication protocol. The aim of these attacks is impersonation. The attacker does not need to guess or obtain a common secret known to bo...
Abstract. Every running thread has its own thread context that consists of values of the fields of the target thread object. To consider the thread context in understanding the be...