-
A Legal and Technical Perspective on Secure Cloud Storage
-
Efficient BitTorrent handshake obfuscation
-
A Comparative Analysis of NAT Hole Punching
-
Prediction Quality of Contact History in Opportunistic Networks
-
Prediction quality of contact history in opportunistic networks
-
NAT Hole Punching Revisited
-
Polybius: Secure Web Single-Sign-On for Legacy Applications
-
Rolling Boles, Optimal XML Structure Integrity for Updating Operations
-
Hecate: Managing Authorization with RESTful XML
-
Questioning flooding as a routing benchmark in Opportunistic Networks