Abstract. What are the real security issues for a wireless sensor network (WSN) intended to monitor the structural health of a suspension bridge, a subway tunnel or a water distrib...
With the increase of automated teller machine (ATM) frauds, new authentication mechanisms are developed to overcome security problems of personal identification numbers (PIN). Th...
Alexander De Luca, Marc Langheinrich, Heinrich Hus...
—Voting is the process through which a democratic society determines its government. Therefore, voting systems are as important as other well-known critical systems, such as air ...
Davide Balzarotti, Greg Banks, Marco Cova, Viktori...
—Many results have been published in the literature based on performance measurements obtained from simulations of Vehicular Networks (VANETs). These simulations use as input tra...
This paper considers the small-world phenomenon in two contexts: ubiquitous computing and security. We argue that small-world properties emerge in ubicomp systems due to their nat...