Nowadays, users not only want to watch digital videos on a PC but also use mobile devices to play back multimedia content. Video adaptation algorithms enable the visualization of ...
Access control is one of the key requirements in enterprise security. A number of approaches in distributed systems have been designed that support various (new) paradigms such as...
Pascal Fenkam, Schahram Dustdar, Engin Kirda, Gera...
: Mobility management is an important task in wireless networks. The Mobile IP protocol provides a basic solution to the mobility management. However, Mobile IP suffers from severa...
We have implemented an identity provider (IdP), which is defined by the Liberty Alliance on a mobile phone. We propose an authentication method, which uses this personal IdP as a ...
Location-based services (LBS) will be a keystone of the new information society that is founded on the information and communications technologies (ICTs). Mobile devices such as c...