In this talk I present our research results in the field of network protocols for secure host authentication and mobility,...
Seguir leyendo arrow_right_altMiddleboxes, such as proxies, firewalls and NATs play an important role in the modern Internet ecosystem. On one hand, they perform advanced functions, e.g. traffic shaping, security or enhancing application performance.
Seguir leyendo arrow_right_altTargeting an increasing number of potential application domains, wireless sensor networks (WSN) have been the subject of intense research, in an attempt to optimize their performance while guaranteeing reliability in highly demanding scenarios.
Seguir leyendo arrow_right_altThe increasing demand for ubiquitous, high-speed and high-performance Internet access challenges the economic viability of mobile network operators which cannot cope with the rate of increase of wireless traffic. Alternate means are considered to deal with the excessive traffic demand that exploit the increase of wireless networks in unlicensed parts of the spectrum, as well as of handheld devices with multiple radio interfaces.
Seguir leyendo arrow_right_altIn this talk, I will discuss an architecture called Energy Aware Disaster Recovery Network using WiFi Tethering (E-DARWIN). The underlying idea is to seamlessly integrate mobile devices carried by the people in a disaster area into the emergency response network by exploiting the WiFi tethering capability that is ubiquitously available in nearly all smartphones already.
Seguir leyendo arrow_right_altDue to the surging increase in data traffic demand, operators try to enhance the coverage and network capacity by intensive spatial reuse. The limiting factor in networks with high spatial reuse is aggregate network interference, which depends strongly on the locations of the interferers.
Seguir leyendo arrow_right_altIn a multi-channel wireless network, each node is able to use multiple non-overlapping frequency channels, by having more network interface cards.
Seguir leyendo arrow_right_altDespite the growing popularity of virtualized services, privacy in the cloud remains an unresolved problem. Companies, such as Turbo Tax, are selling services that prepare income tax returns on-line, in the cloud. However, when the Turbo Tax computer site is compromised, all of its customer’s personal data will be released. Experience dictates that all computer sites are eventually hacked or compromised by human failures.
Seguir leyendo arrow_right_altSeveral challenges persist in what concerns wireless sensor networks, the Internet of Things, and the use of these technologies in human-centric environments.
Seguir leyendo arrow_right_altThe rising number of mobile devices and their increasing computational capabilities enable new interactive context-sensitive applications.
Seguir leyendo arrow_right_alt
Comentarios recientes