: Although RFID is mainly used to identify objects whose data can then be accessed over the network, passive HF RFID tags do have significant data storage capacity (up to 4K), whic...
An architecture for the integration of Grid applications with a Catallactic middleware is described, along with an analysis of issues associated with this integration in a real wo...
Liviu Joita, Omer F. Rana, Pablo Chacin, Isaac Cha...
In open systems where the components, i.e. the agents and the resources, may be unknown at design time, or in dynamic and self-organizing systems evolving with time, there is a ne...
Identity theft through phishing attacks has become a major concern for Internet users. Typically, phishing attacks aim at luring the user to a faked web site to disclose personal ...
Sebastian Gajek, Ahmad-Reza Sadeghi, Christian St&...
A large part of the data on the World Wide Web is hidden behind form-like interfaces. These interfaces interact with a hidden backend database to provide answers to user queries. ...