The prevalent use of XML highlights the need for a generic, flexible access-control mechanism for XML documents that supports efficient and secure query access, without revealing sensitive informat
This paper introduces a novel paradigm for specifying XML security constraints and investigates the enforcement of such constraints during XML query evaluation.
Thanks to pervasive environment, users can remotely have access to various resources and services within their public or private living space.
Compiler transformations can be correct and yet be insecure.
Host-based mobility and multi-homing protocols allow hosts to migrate ongoing transport sessions between networks or network interfaces.
We consider a single-cell downlink massive MIMO system in the presence of an adversary capable of jamming and eavesdropping.
While TV broadcasting is probably the best known application of satellite technology, satellite service providers are now expanding their services to include Internet data transmission.
Mobile data traffic is increasing exponentially and the ability of Mobile Broadband (MBB) technologies, such as LTE-Advanced (LTE-A), to meet this demand depends on the availability of spectrum bey
In a modern telco cloud, network functions are performed by groups of single or interconnected virtual machines (VMs), which form virtualized network functions (VNFs).
This article investigates the security and reliability analysis for a novel satellite-terrestrial network.
Explore more
Video
AI-enhance wireless reliability: joint source and channel coding for robust 6G air interface
Blog
Blog
Podcast