• Publications
  • Influence
A Survey of Computation Offloading for Mobile Systems
TLDR
This paper surveys the development of computation offloading for mobile systems over the last 15 years, and identifies directions for future research. Expand
  • 728
  • 30
  • PDF
PROMISE: peer-to-peer media streaming using CollectCast
TLDR
We present the design, implementation, and evaluation of PROMISE, a novel peer-to-peer media streaming system encompassing the key functions of peer lookup, peer-based aggregated streaming, and dynamic adaptations to network and peer conditions. Expand
  • 470
  • 27
  • PDF
A fast MPEG video encryption algorithm
TLDR
We present a novel MPEG Video Encryption Algorithm, called VEA The basic idea of VEA is to use a secret key randomly changing the sign bits of all of the DCT coefficients of MPEG video. Expand
  • 299
  • 19
Extending Attack Graph-Based Security Metrics and Aggregating Their Application
TLDR
We present simulated results that suggest that our approach reaches a conclusion about which of two attack graphs correspond to a network that is most secure in many instances. Expand
  • 118
  • 18
  • PDF
AO2P: ad hoc on-demand position-based private routing protocol
  • X. Wu, B. Bhargava
  • Computer Science
  • IEEE Transactions on Mobile Computing
  • 1 July 2005
TLDR
An ad hoc on-demand position-based private routing algorithm, called AO2P, is proposed for communication anonymity. Expand
  • 167
  • 18
  • PDF
Secure and efficient access to outsourced data
TLDR
We propose a mechanism to solve this problem in owner-write-users-read applications. Expand
  • 310
  • 16
  • PDF
Visualization of wormholes in sensor networks
TLDR
We propose a mechanism, MDS-VOW, to detect wormholes in a sensor network by visualizing the anomalies introduced by the attack. Expand
  • 321
  • 15
  • PDF
On peer-to-peer media streaming
TLDR
We study a peer-to-peer media streaming system with the following characteristics: (1) its streaming capacity grows dynamically; (2) peers do not exhibit server-like behavior; (3) peers are heterogeneous in their bandwidth contribution; and (4) each streaming session may involve multiple supplying peers. Expand
  • 293
  • 12
  • PDF
An efficient MPEG video encryption algorithm
TLDR
In this paper, we present an efficient MPEG video encryption algorithm. Expand
  • 144
  • 11
MPEG Video Encryption in Real-time Using Secret Key Cryptography
TLDR
We present a fast MPEG video encryption algorithm called RVEA which encrypts selected sign bits of the DCT coeecients and motion vectors using secret key cryptography algorithms such as DES or IDEA. Expand
  • 151
  • 11
...
1
2
3
4
5
...