— Vehicular ad hoc networking is an important component of Intelligent Transportation Systems. The main benefit of vehicular ad hoc network (VANET) communication is seen in activ...
Video streaming over peer-to-peer networks has received significant attention recently. Accordingly, much work is done on video streaming under the assumption that all the peers ...
Abstract—With an increasing number of personalized information and services offered on the Internet, especially the World Wide Web, effective identity management solutions are de...
— This paper develops a mechanism for detecting session hijacking attacks in wireless networks. The proposed scheme is based on detecting abrupt changes in the strength of the re...
—It has been shown that the radio channel impulse response for a pair of legitimate Ultra-wide band (UWB) transceivers can be used to generate secret keys for secure communicatio...
Masoud Ghoreishi Madiseh, Michael L. McGuire, Step...
—A sudden delay spike or reordering in the network can cause TCP to experience a loss event. Since loss is interpreted as a sign of congestion in TCP, this causes the protocol to...
—In this paper, we consider two popular peer-to-peer TV (P2P-TV) systems: PPLive, one of the today most widely used P2P-TV systems, and Joost, a promising new generation applicat...
Delia Ciullo, Marco Mellia, Michela Meo, Emilio Le...
— Distributed Denial of Service Attacks continue to pose major threats to the Internet. In order to traceback attack sources (i.e., IP addresses), a well studied approach is Prob...
Abstract—Optical Transport Networks (OTN) must be prepared in terms of better resource utilization, for accommodating unicast and multicast traffic together. Light-trees have be...
Javier E. Sierra, Luis F. Caro, Fernando Solano, J...