Intelligent security protocols can verify whether the involved principals have properties that are defined based on certain functional and security policies. The property we focu...
Design of protocols for mobile ad-hoc networks (MANETs) is generally tricky compared to wired networks, because on the one hand the increased communication constraints given by th...
Abstract— We developed the HAT (Home Appliance Translator) and HAT-Sub to enable conventional appliances without telecommunication capabilities to connect to home networks. The d...
This paper presents a new QoS guarantee scheme called R-(m,k)-firm (Relaxed-(m,k)-firm) which provides the guarantee on transmission delay of at least m out of any k consecutive p...
Abstract—This paper proposes a novel technique to enable flow-level multi-path forwarding on IPv6 networks. Generally on such networks, any packet from a node is forwarded towar...
The automatic integration of devices into dynamic, automatically configured networks alone does not take advantage of the entire potential of Service Oriented Architectures (SOA)...
This paper points out the privacy issue in the OCSP (Online Certificate Status Protocol), namely, the OCSP responder learns confidential information – who sends a message to w...
For effective management it is necessary to have methods by which management applications can periodically retrieve large volumes of information from network devices. In this work...
This paper presents adaptive resource sharing model that uses a revenue criterion to allocate network resources in an optimal way. The model ensures QoS requirements of data flow...
Jyrki Joutsensalo, Ari Viinikainen, Mika Wikstr&ou...
In this paper we study the problem of scheduling messages between two parallel machines connected by a low latency network during a data redistribution. We compare two approaches....