The increasing popularity of information services that rely on content delivery in mobile environments motivates the need for a mobile push service—an efficient and flexible c...
Abstract—The pervasive computing vision consists in realizing ubiquitous technologies to support the execution of people’s everyday tasks by proactively providing appropriate i...
Most public key crypto systems use finite field modulo arithmetic. This modulo arithmetic is applied on real numbers, binary values and polynomial functions. The computation cost ...
In this paper the term implicit human computer interaction is defined. It is discussed how the availability of processing power and advanced sensing technology can enable a shift ...
In this paper we propose an efficient key agreement protocol suite for heterogeneous mobile ad-hoc groups, whose members use mobile devices with different performance limitations...