In this paper, we discuss key management challenges for seamless handovers across heterogeneous wireless networks. We focus on utilizing existing keying material from previous acc...
Katrin Hoeper, Lidong Chen, Antonio Izquierdo, Nad...
Abstract-- Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose ...
Human stereo perception of glossy materials is substantially different from the perception of diffuse surfaces: A single point on a diffuse object appears the same for both eyes, ...
Krzysztof Templin, Piotr Didyk, Tobias Ritschel, K...
Abstract. A palmprint based authentication system that can work with a multipurpose camera in uncontrolled circumstances, such as those mounted on a laptop, mobile device or those ...