Abstract. One important problem for such public broadcast LBS is to enforce access control on a large number of subscribers. In such a system a user typically subscribes to a LBS f...
We propose a new approach to accessing databases through the Web that is based on the WebDAV protocol (Web-based Distributed Authoring and Versioning). This paper introduces an ex...
Mainly for scalability reasons, many cryptographic security protocols make use of public key cryptography and require the existence of a corresponding public key infrastructure (P...
—In this paper, we describe a practical realization of an Internet-of-Things (IoT) architecture at the University of Padova, Italy. Our network spans the floors of different bui...
Angelo Paolo Castellani, Nicola Bui, Paolo Casari,...