No results match your search criteria.

Radio Resource Management for Millimeter-Wave Networks: Modeling and Design

BeamSec: A Practical mmWave Physical Layer Security Scheme Against Strong Adversaries

Maintaining App Services in Disrupted Cities: A Crisis and Resilience Evaluation Tool

Introducing FreeSpeaker - A Modular Smart Home Hub Prototyping Platform

Security Analysis of Samsung's Ultra-Wideband Ecosystem and the Usage of NXP Ultra-Wideband Chips

Rolling the D11: An Emulation Game for the Whole BCM43 Family

A Large-Scale Data Collection and Evaluation Framework for Android Device Security Attributes

Energy-efficient Broadcast Trees for Decentralized Data Dissemination in Wireless Networks

No One Size (PPM) Fits All: Towards Privacy in Stream Processing Systems

Stochastic Modeling of Beam Management in mmWave Vehicular Networks

FIDO2 the Rescue? Platform vs. Roaming Authentication on Smartphones

Energy-Efficient Decentralized Broadcasting in Wireless Multi-Hop Networks

Decentralized Ultra-Reliable Low-Latency Communications through Concurrent Cooperative Transmission

DEMO: Secure Bootstrapping of Smart Speakers Using Acoustic Communication

Urban Data Platforms and Urban Critical Infrastructure

Liquid Crystals: The way to Scalable and Practical Reconfigurable Intelligent Surfaces in 6G

Designing, building, and characterizing RF switch-based reconfigurable intelligent surfaces

LoRaWAN Security: An Evolvable Survey on Vulnerabilities, Attacks and their Systematic Mitigation

AirGuard - Protecting Android Users from Stalking Attacks by Apple Find My Devices

Next2You: Robust Copresence Detection Based on Channel State Information

Who Can Find My Devices? Security and Privacy of Apple’s Crowd-Sourced Bluetooth Location Tracking System

PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop

My(o) Armband Leaks Passwords: An EMG and IMU Based Keylogging Side-Channel Attack

Attacks on Wireless Coexistence: Exploiting Cross-Technology Performance Features for Inter-Chip Privilege Escalation

Disrupting Continuity of Apple’s Wireless Ecosystem Security: New Tracking, DoS, and MitM Attacks on iOS and macOS Through Bluetooth Low Energy, AWDL, and Wi-Fi

Best Practices for Notification Studies for Security and Privacy Issues on the Internet

Evaluating the Security of a DNS Query Obfuscation Scheme for Private Web Surfing

Snail Mail Beats Email Any Day: On Effective Operator Security Notifications in the Internet

Effective Notification Campaigns on the Web: A Matter of Trust, Framing, and Support

My(o) Armband Leaks Passwords: An EMG and IMU Based Keylogging Side-Channel Attack

Future-Proof Web Authentication: Bring Your Own FIDO2 Extensions

Very Pwnable Network: Cisco AnyConnect Security Analysis

PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop

OpenHaystack: A Framework for Tracking Personal Bluetooth Devices via Apple's Massive Find My Network

AirCollect: Efficiently Recovering Hashed Phone Numbers Leaked via Apple AirDrop

FastZIP: faster and more secure zero-interaction pairing

IEEE 802.11 CSI randomization to preserve location privacy: An empirical evaluation in different scenarios

RESCUE: A Resilient and Secure Device-to-Device Communication Framework for Emergencies

Modification of LTE Firmwares on Smartphones

DEMO: BTLEmap: Nmap for Bluetooth Low Energy

Making Zero-interaction Pairing and Authentication Practical in the Internet of Things

Zero-Interaction Security-Towards Sound Experimental Validation

Disrupting Continuity of Apple's Wireless Ecosystem Security: New Tracking, DoS, and MitM Attacks on iOS and macOS Through Bluetooth Low Energy, AWDL, and Wi-Fi

PrivacyScore: Improving Privacy and Security via Crowd-Sourced Benchmarks of Websites

LoRaWAN Security Analysis : An Experimental Evaluation of Attacks

ARIstoteles: iOS Baseband Interface Protocol Analysis

Improving Online Privacy and Security Through Crowdsourced Transparency Platforms and Operator Notifications

An Unsupervised Approach for Graph-based Robust Clustering of Human Gait Signatures

Stay Connected, Leave no Trace: Enhancing Security and Privacy in WiFi via Obfuscating Radiometric Fingerprints

Towards an Automated Monitoring of RF Activity in Low-Power Wireless Testbeds

Hardware-Accelerated Real-Time Stream Data Processing on Android with GNU Radio

Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets

Firmware Insider: Bluetooth Randomness is Mostly Random

Attaching InternalBlue to the proprietary macOS IOBluetooth framework

Acoustic Integrity Codes: Secure Device Pairing Using Short-Range Acoustic Communication

Concurrent Wireless Cut-Through Forwarding: Ultra Low-Latency Multi-Hop Communication for the IoT

NEAT-TCP: Generation of TCP Congestion Control Through Neuroevolution of Augmenting Topologies

Secure device-to-device communication for emergency response

Improving the Reliability of Bluetooth Low Energy Connections

Availability by Design: Practical Denial-of-Service-Resilient Distributed Wireless Networks

Analyzing Bluetooth Low Energy Connections on Off-the-Shelf Devices

Cross-Technology Broadcast Communication between Off-The-Shelf Wi-Fi, BLE, and IEEE 802.15.4 Devices

Security and Privacy for IoT Ecosystems

Demo: Linux Goes Apple Picking: Cross-Platform Ad hoc Communication with Apple Wireless Direct Link

SEMUD: Secure multi-hop device-to-device communication for 5G public safety networks

A Fault-Tolerant Programming Model for Distributed Interactive Applications

LIDOR: A Lightweight DoS-Resilient Communication Protocol for Safety-Critical IoT Systems

A Billion Open Interfaces for Eve and Mallory : MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link

One Billion Apples' Secret Sauce: Recipe for the Apple Wireless Direct Link Ad hoc Protocol

Empirical insights for designing Information and Communication Technology for International Disaster Response

Hybrid Precoding for Multi-Group Multicasting in mmWave Systems

Riding the Waves: Decoding Asynchronous Multi-User MISO via Time-Variant Zero-Forcing

Zero-Interaction Security - Towards Sound Experimental Validation

Free Your CSI: A Channel State Information Extraction Platform For Modern Wi-Fi Chipsets

Benchmarking and Profiling the GNURadio Scheduler

The Emergency Responsive Digital City

InternalBlue - Bluetooth Binary Patching and Experimentation Framework

Towards Transparency in Email Tracking

Inside Job: Diagnosing Bluetooth Lower Layers Using Off-the-Shelf Devices

Perils of Zero-Interaction Security in the Internet of Things

Practical VLC to WiFi Handover Mechanisms

Transitions: A Protocol-Independent View of the Future Internet

On the Difficulties of Incentivizing Online Privacy through Transparency: A Qualitative Survey of the German Health Insurance Market

Sea of Lights: Practical Device-to-Device Security Bootstrapping in the Dark

Performance and Security Enhancements in Practical Millimeter-Wave Communication Systems

Bluemergency: Mediating Post-disaster Communication Systems using the Internet of Things and Bluetooth Mesh

Demo: Visualizing Adaptation Decisions in Pervasive Communication Systems

The King is Dead Long Live the King! Towards Systematic Performance Evaluation of Heterogeneous Bluetooth Mesh Networks in Real World Environments

Toxic Friends in Your Network: Breaking the Bluetooth Mesh Friendship Concept

CoalaViz: Supporting Traceability of Adaptation Decisions in Pervasive Communication Systems

A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link

TPy: A Lightweight Framework for Agile Distributed Network Experiments

Demo: Linux Goes Apple Picking: Cross-Platform Ad hoc Communication with Apple Wireless Direct Link

One Billion Apples' Secret Sauce: Recipe for the Apple Wireless Direct Link Ad hoc Protocol

Conducting a Large-scale Field Test of a Smartphone-based Communication Network for Emergency Response

Adaptive Codebook Optimization for Beam-Training on Off-The-Shelf IEEE 802.11ad Devices

The Nexmon firmware analysis and modification framework: Empowering researchers to enhance Wi-Fi devices

ACE of Spades in the IoT Security Game: A Flexible IPsec Security Profile for Access Control

Security Analysis and Firmware Modification of Fitbit Fitness Trackers

Wi-Fi Based Key Exchange On Android Smartphones

InternalBlue – A Bluetooth Experimentation Framework Based on Mobile Device Reverse Engineering

Learning the Beams

Beam-Stealing: Intercepting the Sector Sweep to Launch Man-in-the-Middle Attacks on Wireless IEEE 802.11ad Networks

Fast and Infuriating: Performance and Pitfalls of 60 GHz WLANs Based on Consumer-Grade Hardware

Shadow Wi-Fi: Teaching Smartphones to Transmit Raw Signals and to Extract Channel State Information to Implement Practical Covert Channels over Wi-Fi

Analysing and Evaluating Interface, Communication, and Web Security in Productive IoT Ecosystems

Making Wi-Fi Fit for the Tactile Internet: Low-Latency Wi-Fi Flooding Using Concurrent Transmissions

Optimal Joint Routing and Scheduling in Millimeter-Wave Cellular Networks

Indoor Localization Using Commercial Off-The-Shelf 60 GHz Access Points

Angriffsanalyse einer TETRA-Basisstation

Anatomy of a Vulnerable Fitness Tracking System: Dissecting the Fitbit Cloud, App, and Firmware

TPy: A Lightweight Framework for Agile Distributed Network Experiments

A systematic approach to constructing families of incremental topology control algorithms using graph transformation

Teaching Your Wireless Card New Tricks: Smartphone Performance and Security Enhancements Through Wi-Fi Firmware Modifications

Emergency Communication in Challenged Environments via Unmanned Ground and Aerial Vehicles

Investigating Practical Man-in-the-middle Network Attacks on IEEE 802.11ad

mproving a Linux Device Driver for Visible Light Communication

Detecting WiFi Covert Channels

Temporal Coverage Analysis of Router-based Cloudlets Using Human Mobility Patterns

Compressive Millimeter-Wave Sector Selection in Off-the-Shelf IEEE 802.11ad Devices

Unsupervised Traffic Flow Classification Using a Neural Autoencoder

Implementierung des unteren MAC-Layers für die OpenVLC-Hardware

Implementation of a physical layer for visible light communication using the OpenVLC platform

SEDCOS: A Secure Device-to-Device Communication System for Disaster Scenarios

Nexmon: Build Your Own Wi-Fi Testbeds With Low-Level MAC and PHY-Access Using Firmware Patches on Off-the-Shelf Mobile Devices

A Practical and Secure Social Media Facility for Internet-Deprived Populations

Design and evaluation of a hybrid SDR testbed for visible light communication and Wi-Fi

Mitigating Lateral Interference: Adaptive Beam Switching for Robust Millimeter-Wave Networks

Utilizing Advanced Network Context to Optimize Software-Defined Networks

Web-Privacy: Lustwandeln im Trackergarten

Survey and Systematization of Secure Device Pairing

PrivacyScore: Analyse von Webseiten auf Sicherheits- und Privatheitsprobleme - Konzept und rechtliche Zulässigkeit

Massive reactive smartphone-based jamming using arbitrary waveforms and adaptive power control

Upgrading Wireless Home Routers as Emergency Cloudlet and Secure DTN Communication Bridge

DEMO: Demonstrating Reactive Smartphone-Based Jamming

Instrumenting Wireless Sensor Networks : A Survey on the Metrics That Matter

PrivacyScore: Improving Privacy and Security via Crowd-Sourced Benchmarks of Websites

Reverse Engineering Human Mobility in Large-scale Natural Disasters

Lightweight Detection of Denial-of-Service Attacks on Wireless Sensor Networks Revisited

SEDCOS: A Secure Device-to-Device Communication System for Disaster Scenarios

Dynamic Role Assignment in Software-Defined Wireless Networks

mm-Broker: Managing Directionality and Mobility Issues of Millimeter-Wave via D2D Communication

PrivacyScore : Analyse von Webseiten auf Sicherheits- und Privatheitsprobleme : Konzept und rechtliche Zulässigkeit

Panopticon: Supervising Network Testbed Resources

Maintaining both availability and integrity of communications: Challenges and guidelines for data security and privacy during disasters and crises

Analyzing TETRA Location Privacy and Network Availability

Tie-breaking Can Maximize Fairness without Sacrificing Throughput in D2D-assisted Networks

DEMO: Using NexMon, the C-based WiFi firmware modification framework

Far Away and Yet Nearby - A Framework for Practical Distance Fraud on Proximity Services for Mobile Devices (Demo)

On the Privacy and Performance of Mobile Anonymous Microblogging

DEMO: Demonstrating Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems

Profiling the Strength of Physical-Layer Security: A Study in Orthogonal Blinding

Trust The Wire, They Always Told Me!: On Practical Non-Destructive Wire-Tap Attacks Against Ethernet

Xcastor: Secure and Scalable Group Communication in Ad Hoc Networks

STEAN: A Storage and Transformation Engine for Advanced Networking Context

A System for Privacy-Preserving Mobile Health and Fitness Data Sharing: Design, Implementation and Evaluation

Improving Quality of Service in Wireless Sensor Networks for Industrial Automation

Finite Horizon Opportunistic Multicast Beamforming

Xcastor: Secure and scalable group communication in ad hoc networks

Addressing MAC Layer Inefficiency and Deafness of IEEE802.11ad Millimeter Wave Networks using a Multi-Band Approach

Millimeter-Wave Blind Spots: Mitigating Deafness Collisions Using Frame Aggregation

Learning from Experience: Efficient Decentralized Scheduling for 60GHz Mesh Networks

Using Channel State Information for Tamper Detection in the Internet of Things

Can I Help You Setting Your Privacy? A Survey-based Exploration of Users Attitudes towards Privacy Suggestions

OFDMA for Wireless Multihop Networks: From Theory to Practice

Performance evaluation of delay-tolerant wireless friend-to-friend networks for undetectable communication

APP and PHY in Harmony: Demonstrating Scalable Video Streaming Supported by Flexible Physical Layer Control

Lockpicking Physical Layer Key Exchange: Weak Adversary Models Invite the Thief

NFCGate: An NFC Relay Application for Android

Lightweight Intrusion Detection in Wireless Sensor Networks

APP and PHY in Harmony: A Framework Enabling Flexible Physical Layer Processing to Address Application Requirements

Enabling Efficient, Robust, and Scalable Wireless Multi-Hop Networks: A Cross-Layer Approach Exploiting Cooperative Diversity

A Distributed Reputation System for Certification Authority Trust Management

Highly Efficient Known-Plaintext Attacks against Orthogonal Blinding based Physical Layer Security

Show Me Your Phone, I Will Tell You Who Your Friends Are: Analyzing Smartphone Data to Identify Social Relationships

Building Cross-Layer Corridors in Wireless Multihop Networks

BER Enhancements for Practical Interference Alignment in the Frequency Domain

Practical OFDMA for Corridor-based Routing in Wireless Multihop Networks

Active Intrusion Detection for Wireless Multihop Networks

Practical Interference Alignment in the Frequency Domain for OFDM-based Wireless Access Networks

Scalable and Secure Multicast Routing for Mobile Ad-hoc Networks

Making Active-Probing-Based Network Intrusion Detection in Wireless Multihop Networks Practical: A Bayesian Inference Approach to Probe Selection.

WARP Drive - Accelerating Wireless Multi-hop Cross-layer Experimentation on SDRs

Corridor-based Routing: Opening Doors to PHY-Layer Advances for Wireless Multihop Networks

How did you get here? PHY-Layer Path Signatures

TrustMeter: A trust assessment scheme for collaborative privacy mechanisms in participatory sensing applications

Analyzing Active Probing for Practical Intrusion Detection in Wireless Multihop Networks

Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems

Measuring the Impact of Denial-of-Service Attacks on Wireless Sensor Networks

Making 'Glossy' Networks Sparkle: Exploiting Concurrent Transmissions for Energy Efficient, Reliable, Ultra-low Latency Communication in Wireless Control Networks

Mind the Gap – Understanding the Traffic Gap when Switching Communication Protocols

uSafe: A Privacy-aware and Participative Mobile Application for Citizen Safety in Urban Environments

Raising User Awareness about Privacy Threats in Participatory Sensing Applications through Graphical Warnings

CSI Feedback in OFDMA Wireless Networks with Multiple Transmitter-Receiver Pairs

Evaluating Dynamic OFDMA Subchannel Allocation for Wireless Mesh Networks on SDRs

Node Selection for Corridor-based Routing in OFDMA Multihop Networks

A Blueprint for Switching Between Secure Routing Protocols in Wireless Multihop Networks

EVM and RSSI Link Quality Measurements in Frequency Selective Fading Channels

A Rapid Prototyping Framework for Practical OFDMA Systems using Software Defined Radios

Not the Enemy but the Ally: Increasing the Security of Wireless Networks Using Smartphones (extended abstract)

DogoIDS: a mobile and active intrusion detection system for IEEE 802.11s wireless mesh networks

Spatial reuse in OFDMA multi-hop networks applying corridor-based routing

Face the Enemy: Attack Detection for Planar Graph Routing

Curve-based Planar Graph Routing with Guaranteed Delivery in Multihop Wireless Networks

IncogniSense: An Anonymity-preserving Reputation Framework for Participatory Sensing Applications

Share with Strangers: Privacy Bubbles as User-centered Privacy Control for Mobile Content Sharing Applications

Let's Talk Together: Understanding Concurrent Transmission in Wireless Sensor Networks

On the Efficiency of Privacy-preserving Path Hiding for Mobile Sensing Applications

Privacy in Participatory Sensing - User-controlled Privacy-preserving Solutions for Mobile Sensing Applications

Improving Privacy Settings for Facebook by Using Interpersonal Distance as Criterion

Weniger ist Mehr: Leichtgewichtige Metriken zur Erkennung von Denial-of-Service Angriffen in Drahtlosen Sensornetzen

Smarter Building for the Smart Grid? Let them Forecast Their Power Consumption

Enhancing User Privacy by Prepocessing Distributed Smart Meter Data

What’s the Value of Your Privacy? Exploring Factors that Influence Privacy-sensitive Contributions to Participatory Sensing Applications

Predicting the Power Consumption of Electric Appliances through Time Series Pattern Matching

Improving Privacy Settings for Facebook by Using Interpersonal Distance as Criterion

Balancing energy efficiency and throughput fairness in IEEE 802.11 WLANs

Signs of a Bad Neighborhood: A Lightweight Metric for Anomaly Detection in Mobile Ad Hoc Networks

On the Accuracy of Appliance Identification Based on Distributed Load Metering Data.

CachedSensing: Exploring and Documenting the Environment as a Treasure Hunt

Opportunistic forwarding in multi-hop OFDMA networks with local CSI

Optimization and Scheduling of Wireless Sensor Networks for Periodic Control Systems

Corridor-based Routing using Opportunistic Forwarding in OFDMA Multihop Networks

Topology-Driven Secure Initialization in Wireless Sensor Networks: A Tool-Assisted Approach

Curve-based Planar Graph Routing with Guaranteed Delivery in Multihop Wireless Networks

Energy-efficient fair channel access for IEEE 802.11 WLANs

Two-Way Relaying for Multiple Applications in Wireless Sensor Networks

IncogniSense: An Anonymity-preserving Reputation Framework for Participatory Sensing Applications

A Secure Monitoring and Control System for Wireless Sensor Networks

HOPSCOTCH: An Adaptive and Distributed Channel Hopping Technique for Interference Avoidance in Wireless Sensor Networks

A Survey on Privacy in Mobile Participatory Sensing Applications

Curve-based Planar Graph Routing in Multihop Wireless Networks

Privacy-preserving Collaborative Path Hiding for Participatory Sensing Applications

A Picture is Worth a Thousand Words: Privacy-aware and Intuitive Relationship Establishment in Online Social Networks

We Must Move - We Will Move: On Mobile Phones as Sensing Platforms

A Secure Monitoring and Control System for Wireless Sensor Networks

Sichere Netze - Mit dem Nutzer im Zentrum (Invited Paper)

The Rise and Fall of the AODV Protocol: A Testbed Study on Practical Routing Attacks

Fine-grained Access Control Enabling Privacy Support in Wireless Sensor Networks (Extended Abstract)

Security and Privacy Objectives for Sensing Applications in Wireless Community Networks (Invited Paper)

On the Energy Efficiency of IEEE 802.11 WLANs

On the Trade-Off between Throughput Maximization and Energy Consumption Minimization in IEEE 802.11 WLANs

Trimming the Tree: Tailoring Adaptive Huffman Coding to Wireless Sensor Networks

A Security Framework for Wireless Mesh Networks

CORE: Centrally Optimized Routing Extensions for Efficient Bandwidth Management and Network Coding in the IEEE 802.16 MeSH Mode

Quality of Experience of Voice Communication in Large-Scale Mobile Ad Hoc Network

An Analytical Model of Routing, Misbehavior, and Countermeasures in Mobile Ad Hoc Networks

ContextFramework.KOM - Eine offene Middleware zur Integration heterogener Sensoren in eine Kontext-sensitive Kommunikationsplattform (Extended Abstract)

A Stochastic Analysis of Secure Joint Decision Processes in Peer-to-Peer Systems

Throughput and Energy Efficiency in IEEE 802.11 WLANs: Friends or Foes?

WiMAX Mesh Architectures and Network Coding

Stream-oriented Lossless Packet Compression in Wireless Sensor Networks

An Evaluation of Cooperative Decisions in Peer-to-Peer Systems - Mathematics vs. Testbed Studies (Abstract)

Incorporating Spatial Reuse into Algorithms for Bandwidth Management and Scheduling in IEEE 802.16j Relay Networks

Distributed Bandwidth Reservation Strategies to Support Efficient Bandwidth Utilization and QoS on a Per-Link Basis in IEEE 802.16 Mesh Networks

Harnessing Delay Tolerance to Increase Delivery Ratios in Mobile Ad Hoc Networks with Misbehaving Nodes

An Approach towards Adaptive Payload Compression in Wireless Sensor Networks (Extended Abstract)

Exploiting Schelling Behavior for Improving Data Accessibility in Mobile Peer-to-Peer Networks

A Note on Practical Deployment editions for Network Coding in the IEEE 802.16 MeSH Mode

GeoSec - Quarantine Zones for Mobile Ad hoc Networks

AntSec, WatchAnt and AntRep:Innovative Security Mechanisms for Wireless Mesh Networks

Der Assistent in Hintergrund: Adaptives Kommunikationsmanagement durch Lernen vom Nutzer

Dynamische Authentifizierung für Provider-übergreifende VoIP-Kommunikation

QoS in Wireless Mesh Networks: Challenges, Pitfalls and Roadmap to its Realization (Keynote Paper)

Geographically Secure Routing for Mobile Ad Hoc Networks: A Cross-Layer Based Approach

Slow and Steady: Modelling and Performance Analysis of the Network Entry Process in IEEE 802.16

A Case for Joint Routing and Scheduling and Network Coding in TDMA-based Wireless Mesh Networks: A Cross-layer Approach (Extended Abstract and Poster)

JiST/MobNet: Combined Simulation, Emulation, and Real-world Testbed for Ad hoc Networks

Sicherheit und Verfügbarkeit in mobilen Ad hoc Netzen - Ein geographischer, schichtenübergreifender Ansatz (Abstract)

QoS Routing Open Agenda

Crossing the Chasm with Ad hoc Networks - The Provider-mediated Communication Paradigm (Extended Abstract and Post)

Establishing P2P-Overlays for Ad Hoc Networks Using Provider Subscription

Modeling Static and Dynamic Behavior of Routes in Mobile Ad hoc Networks (Extended Abstract and Poster)

M2DR: A Near-optimal Multiclass Minimum-delay Routing Algorithm for Smart Radio Access Networks

A Survey on Dependable Routing in Sensor Networks, Ad hoc Networks, and Cellular Networks

The Ad Hoc On-Demand Distance Vector Protocol: An Analytical Model of the Route Acquisition Process

Modeling Mobility for Cellular Networks Based on Statistical Data Collection

Security for Ad-Hoc Service Information - Threat Analysis of the Service Location Protocol

The Ad Hoc On-Demand Distance Vector Protocol: An Analytical Model of the Route Acquisition Process

Security Goals for Service Discovery in Ad-hoc Environments

Sicherheitsaspekte bei der Einsatzplanung von Microsoft Windows 2000

A Security Model for Multicast Group Integrity Management

Security Issues in Group Integrity Management for Multimedia Multicasting

Schwerpunktentwicklungen der Computertechnik und Telekommunikation, Benutzungsmodelle und Werkzeuge: Zukünftige Entwicklung von Kommunikationstechnologie und Multimedia