Now showing items 1-2 of 2

    • Wu, Taojun (2007-06-26)
      Department: Computer Science
      The rapid wireless technology development and wide wireless networks deployment provide to us emerging composite networks permeated by wireless communications. The current Internet will remain and serve as the ``communication ...
    • Sewell, George Edmond (2007-08-06)
      Department: Electrical Engineering
      Trustworthy computer systems protect the access of sensitive information by an unauthorized agent (i.e., an attacker). However, security vulnerabilities exist which can allow a system to be compromised by an attacker. An ...