Abstract. Although privacy is often seen as an essential right for internet users, the provision of anonymity can also provide the ultimate cover for malicious users. Privacy Enhan...
The demand of security is getting higher in these days due to easy reproduction of digitally created multimedia data. Digital watermark is the emerging technique to embed secret i...
Abstract— In highly open systems like the Internet, attributebased access control (ABAC) has proven its appropriateness. This is reflected in the utilization of ABAC in authenti...
Torsten Priebe, Wolfgang Dobmeier, Christian Schl&...
This paper discusses the development of a series of models that ultimately leads to an unusual simulation approach to modeling automated guided vehicles on a factory floor. A pede...
Lisa A. Schaefer, Gerald T. Mackulak, Jeffery K. C...
This paper presents the use of adaptive mobile agents for remote operation, enabling real-time response in spite of the limitations of the communication channels in terms of time-d...
Luis M. Camarinha-Matos, Octavio Castolo, Walter V...