To address the privacy concerns associated with RFID, previous work proposed an approach, where RFID readers do not only broadcast commands to inventory tag populations, but also ...
Christian Metzger, Christian Floerkemeier, Philipp...
Interest in extracting and exploiting information from wireless sensor networks has been increasing for several years. Most scenarios focus on collecting and evaluating large amoun...
It is expected that more and more people will search the web when they are on the move. Though conventional search engines can be directly visited from mobile devices with web bro...
Numerous schemes have been proposed for secure routing protocols, and Intrusion Detection and Response Systems, for ad hoc networks. In this paper, we present a proof-of-concept i...
Anand Patwardhan, Jim Parker, Anupam Joshi, Michae...
Networks of small devices, such as environmental sensors, introduce a number of new challenges for traditional protocols and approaches. In particular, the extreme resource constr...