With the increasing popularity of mobile computing platforms such as personal digital assistants (PDAs) and smart mobile phones, applications originally designed for higherperform...
Supporting a rich array of information sources is a key element to making highly mobile computing devices usable by the wider community. It is our belief that there will not be on...
Peter Hutterer, Mark T. Smith, John Ankcorn, Wayne...
Even though IPv6 has been developed for more than a decade, IPv4 is still the most commonly adopted network protocol. However, the significant changes in the new version may cause...
Recently, a receipt-free scheme is rising for a secure eauction. The goal of a receipt-free scheme in an eauction is to prevent a bid-rigging. If the bid-rigging happens in the e-...
Mobile ad hoc networks (MANETs) enable all mobile nodes to communicate each other without base stations or access points, and the transfer of data packets is completed through the...
Security protocols are indispensable in secure communication. We give an operational semantics of security protocols in terms of a Prolog-like language. With this semantics, we ca...
A re-ranking technique,called “PageRank brings a successful story behind the search engine. Many studies focus on finding an way to compute the PageRank scores of a large web gr...
Intrusion Detection Systems (IDS) have become widely used tools for ensuring system and network security. Among many other challenges, contemporary IDS have to cope with increasin...
In this paper, we propose an efficient power saving protocol for multi-hop mobile ad hoc networks, called p-MANET. Our design is expected as a new foundation MAC layer power savin...
In the next generation Internet, the network should not only be considered as a communication medium, but also as an endless source of services available to the end-systems. These...